China-linked UAT-7290 targets telecoms with Linux malware

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

Cisco Talos, a cybersecurity firm, has detailed the activities of UAT-7290, a threat actor linked to China, in a recent analysis. This group has focused its espionage efforts on the telecommunications sector, initiating operations as early as 2022.

The primary tools in UAT-7290's arsenal include custom Linux malware designed to infiltrate and persist within telecom environments. These malicious programs allow the actors to exfiltrate sensitive data and monitor network traffic undetected.

In addition to the malware, UAT-7290 exploits vulnerabilities in edge devices, which serve as entry points into broader telecom infrastructures. Once inside, the group deploys ORB nodes—specialized components of their infrastructure—to ensure long-term access and control over compromised systems.

This campaign highlights ongoing risks to critical infrastructure in the telecom industry, where persistent threats can lead to significant data compromises. Cisco Talos's findings underscore the sophistication of state-linked operations, emphasizing the need for robust defenses against such targeted intrusions.

No specific victims or additional technical details beyond these methods were disclosed in the report, but the focus on telecoms suggests strategic interests in communication networks.

Makala yanayohusiana

Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Picha iliyoundwa na AI

Qilin ransomware deploys Linux binaries against Windows systems

Imeripotiwa na AI Picha iliyoundwa na AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Imeripotiwa na AI

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Imeripotiwa na AI

Chinese cyberattacks on Taiwan's key infrastructure rose 6% in 2025 to an average of 2.63 million daily, according to the National Security Bureau. This surge forms part of 'hybrid threats' synchronized with military drills. It supports China's broader aims in technology and politics.

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Imeripotiwa na AI

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Alhamisi, 19. Mwezi wa pili 2026, 13:36:25

Researchers uncover new SysUpdate malware variant targeting Linux

Jumatano, 18. Mwezi wa pili 2026, 23:37:21

New SysUpdate malware variant targets Linux systems

Jumatano, 11. Mwezi wa pili 2026, 12:13:09

North Korean hackers use AI video to spread malware

Jumatano, 11. Mwezi wa pili 2026, 00:43:36

Researchers discover SSHStalker botnet infecting Linux servers

Jumatano, 4. Mwezi wa pili 2026, 19:25:39

Russian hackers exploit Microsoft Office vulnerability days after patch

Jumanne, 20. Mwezi wa kwanza 2026, 21:52:38

EU commission aims to ban chinese risk technology from networks

Jumatano, 14. Mwezi wa kwanza 2026, 15:36:41

China directs firms to halt use of US and Israeli cybersecurity software

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 23:54:19

China-nexus groups and cybercriminals ramp up React2Shell exploits

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 02:22:17

Rust-based Luca stealer targets Linux and Windows systems

Jumatano, 29. Mwezi wa kumi 2025, 07:35:36

New gentlemen's raas advertised on underground forums

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa