China-linked UAT-7290 targets telecoms with Linux malware

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

Cisco Talos, a cybersecurity firm, has detailed the activities of UAT-7290, a threat actor linked to China, in a recent analysis. This group has focused its espionage efforts on the telecommunications sector, initiating operations as early as 2022.

The primary tools in UAT-7290's arsenal include custom Linux malware designed to infiltrate and persist within telecom environments. These malicious programs allow the actors to exfiltrate sensitive data and monitor network traffic undetected.

In addition to the malware, UAT-7290 exploits vulnerabilities in edge devices, which serve as entry points into broader telecom infrastructures. Once inside, the group deploys ORB nodes—specialized components of their infrastructure—to ensure long-term access and control over compromised systems.

This campaign highlights ongoing risks to critical infrastructure in the telecom industry, where persistent threats can lead to significant data compromises. Cisco Talos's findings underscore the sophistication of state-linked operations, emphasizing the need for robust defenses against such targeted intrusions.

No specific victims or additional technical details beyond these methods were disclosed in the report, but the focus on telecoms suggests strategic interests in communication networks.

관련 기사

Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
AI에 의해 생성된 이미지

Qilin ransomware deploys Linux binaries against Windows systems

AI에 의해 보고됨 AI에 의해 생성된 이미지

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

AI에 의해 보고됨

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Threat actors are shifting from traditional languages like C and C++ to modern ones such as Rust, enabling cross-platform malware development. A new Rust-based information stealer called Luca has emerged, released openly to the public. This development highlights growing use of Rust in malware, posing new challenges for cybersecurity defenders.

AI에 의해 보고됨

The EU Commission has presented a revised cybersecurity law to better fend off attacks and reduce dependencies on high-risk third countries. In particular focus: Chinese companies like Huawei and ZTE, which are to be effectively excluded from 5G rollout. This follows a recent hacker attack on the Eurail platform.

2025년 필리핀의 사이버 위협은 피싱과 랜섬웨어 같은 전통적 방법에 머물렀으며 새로운 형태는 등장하지 않았다. 그러나 인공지능이 이러한 공격의 양과 규모를 증폭시켜 '사이버 범죄의 산업화'를 초래했다. 여러 사이버 보안 업체의 보고서는 사건의 속도, 규모, 빈도의 증가를 강조한다.

AI에 의해 보고됨

InfinitUs Marketing Solutions의 유출 내부 문건이 가짜 소셜미디어 계정을 이용해 필리핀인의 중국에 대한 부정적 인식을 바꾸려는 작전을 보여줍니다. 이는 웨스트 필리핀해 긴장 고조 속에 일어났습니다. 중국 대사관은 아직 이러한 주장에 응답하지 않았습니다.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부