Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

Posted on January 8, 2026January 8, 2026 By CWS

Jan 08, 2026Ravie LakshmananMalware / Menace Intelligence
A China-nexus risk actor often called UAT-7290 has been attributed to espionage-focused intrusions in opposition to entities in South Asia and Southeastern Europe.
The exercise cluster, which has been energetic since a minimum of 2022, primarily focuses on intensive technical reconnaissance of goal organizations earlier than initiating assaults, finally resulting in the deployment of malware households reminiscent of RushDrop, DriveSwitch, and SilentRaid, in accordance with a Cisco Talos report revealed right this moment.
“Along with conducting espionage-focused assaults the place UAT-7290 burrows deep inside a sufferer enterprise’s community infrastructure, their techniques, strategies, and procedures (TTPs) and tooling recommend that this actor additionally establishes Operational Relay Field (ORBs) nodes,” researchers Asheer Malhotra, Vitor Ventura, and Brandon White stated.
“The ORB infrastructure might then be utilized by different China-nexus actors of their malicious operations, signifying UAT-7290’s twin function as an espionage-motivated risk actor in addition to an preliminary entry group.”

Assaults mounted by the adversary have primarily focused telecommunications suppliers in South Asia. Nonetheless, latest intrusion waves have branched out to strike organizations in Southeastern Europe.
UAT-7290’s tradecraft is broad because it’s diversified, counting on a mixture of open-source malware, customized tooling, and payloads for 1-day vulnerabilities in fashionable edge networking merchandise. A number of the notable Home windows implants put to make use of by the risk actor embrace RedLeaves (aka BUGJUICE) and ShadowPad, each solely linked to Chinese language hacking teams.
That stated, the group primarily leverages a Linux-based malware suite comprising –

RushDrop (aka ChronosRAT), a dropper that initiates the an infection chain
DriveSwitch, a peripheral malware that is used to execute SilentRaid on the contaminated system
SilentRaid (aka MystRodX), a C++-based implant that establishes persistent entry to compromised endpoints and employs a plugin-like method to speak with an exterior server, open a distant shell, arrange port forwarding, and carry out file operations

It is price noting {that a} prior evaluation from QiAnXin XLab flagged MystRodX as a variant of ChronosRAT, a modular ELF binary that is able to shellcode execution, file administration, keylogging, port forwarding, distant shell, screenshot seize, and proxy. Palo Alto Networks Unit 42 is monitoring the related risk cluster beneath the moniker CL-STA-0969.

Additionally deployed by UAT-7290 is a backdoor known as Bulbature that is engineered to remodel a compromised edge system into an ORBs. It was first documented by Sekoia in October 2024.
The cybersecurity firm stated the risk actor shares tactical and infrastructure overlaps with China-linked adversaries often called Stone Panda and RedFoxtrot (aka Nomad Panda).
“The risk actor conducts intensive reconnaissance of goal organizations earlier than finishing up intrusions. UAT-7290 leverages one-day exploits and target-specific SSH brute power to compromise public-facing edge units to achieve preliminary entry and escalate privileges on compromised techniques,” the researchers stated. “The actor seems to depend on publicly out there proof-of-concept exploit code versus creating their very own.”

The Hacker News Tags:ChinaLinked, Linux, Malware, Nodes, ORB, Targets, Telecoms, UAT7290

Post navigation

Previous Post: Rethinking Security for Agentic AI
Next Post: Microsoft Enforces Mandatory MFA for Microsoft 365 Admin Center Logins

Related Posts

CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog The Hacker News
Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet The Hacker News
Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China The Hacker News
Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues The Hacker News
6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits 6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits The Hacker News
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News