China-linked UAT-7290 targets telecoms with Linux malware

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

Cisco Talos, a cybersecurity firm, has detailed the activities of UAT-7290, a threat actor linked to China, in a recent analysis. This group has focused its espionage efforts on the telecommunications sector, initiating operations as early as 2022.

The primary tools in UAT-7290's arsenal include custom Linux malware designed to infiltrate and persist within telecom environments. These malicious programs allow the actors to exfiltrate sensitive data and monitor network traffic undetected.

In addition to the malware, UAT-7290 exploits vulnerabilities in edge devices, which serve as entry points into broader telecom infrastructures. Once inside, the group deploys ORB nodes—specialized components of their infrastructure—to ensure long-term access and control over compromised systems.

This campaign highlights ongoing risks to critical infrastructure in the telecom industry, where persistent threats can lead to significant data compromises. Cisco Talos's findings underscore the sophistication of state-linked operations, emphasizing the need for robust defenses against such targeted intrusions.

No specific victims or additional technical details beyond these methods were disclosed in the report, but the focus on telecoms suggests strategic interests in communication networks.

Related Articles

Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Image generated by AI

Qilin ransomware deploys Linux binaries against Windows systems

Reported by AI Image generated by AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Reported by AI

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Reported by AI

Chinese cyberattacks on Taiwan's key infrastructure rose 6% in 2025 to an average of 2.63 million daily, according to the National Security Bureau. This surge forms part of 'hybrid threats' synchronized with military drills. It supports China's broader aims in technology and politics.

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Reported by AI

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline