Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hackers Employ Custom Malware to Target Government Data

Chinese Hackers Employ Custom Malware to Target Government Data

Posted on May 7, 2026 By CWS

A cyber threat group identified as UAT-8302, associated with China, has been reported to target government institutions across South America and Southeastern Europe. The group utilizes a combination of custom malware and readily available open-source tools to exfiltrate sensitive information.

Organized Cyber Intrusions

Since late 2024, UAT-8302 has intensified its efforts in attacking governmental entities in Southeastern Europe throughout 2025. The group’s strategy involves penetrating networks, maintaining a low profile, and extracting valuable data.

The hackers’ proficiency lies in their ability to mask their activities. By leveraging legitimate cloud services in conjunction with custom-developed malware, they complicate the differentiation between authentic network traffic and malicious actions.

Advanced Persistent Threat Tactics

Displaying significant patience, UAT-8302 conducts thorough reconnaissance of network endpoints before advancing further. This meticulous approach is typical of state-sponsored attacks targeting critical governmental infrastructures.

According to Cisco Talos researchers, UAT-8302 is a China-linked advanced persistent threat (APT) group. Their primary mission involves gaining and sustaining prolonged access to government and related sectors globally.

The analysis by Talos highlights a shared toolkit with other China-nexus groups, suggesting a close operational collaboration among these threat actors.

Malware and Techniques

Upon breaching a network, UAT-8302 executes a systematic procedure involving credential collection, Active Directory data gathering, and network mapping. They utilize tools like Impacket and custom PowerShell scripts to understand the environment thoroughly.

Among their malware arsenal, the group deploys NetDraft, a .NET-based backdoor linked to the FinDraft family, and the CloudSorcerer backdoor. This arsenal enables comprehensive control and data extraction from compromised systems.

NetDraft is particularly noteworthy for its use of a DLL side-loading method, disguising its communication with a OneDrive-based command-and-control server through Microsoft Graph API, which allows it to evade detection.

Preventive Measures Against UAT-8302

To counter UAT-8302’s tactics, government agencies are advised to enhance endpoint detection systems, scrutinize outbound cloud traffic, and conduct regular audits of scheduled tasks and DLL loading behaviors.

Monitoring unusual patterns on platforms like OneDrive and GitHub, and keeping network security tools updated, can help mitigate the risks posed by this sophisticated threat group.

As cyber threats evolve, maintaining robust cybersecurity measures and staying informed on the latest threat intelligence is critical for protecting sensitive government data.

Cyber Security News Tags:APT groups, Chinese hackers, cyber threats, Cybersecurity, data breach, government data, Malware, network security, open-source tools, UAT-8302

Post navigation

Previous Post: AI Vision Models Vulnerable to Subtle Image Manipulations
Next Post: Ivanti Warns of Active Exploitation in EPMM Vulnerability

Related Posts

11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware 11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware Cyber Security News
Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools Cyber Security News
New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd Cyber Security News
Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums Cyber Security News
Microsoft to Restrict Windows 11 Auto Installs Due to RCE Flaw Microsoft to Restrict Windows 11 Auto Installs Due to RCE Flaw Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Daemon Tools Supply Chain Breach Managed, Says Vendor
  • PCPJack Compromises Cloud Systems Using 5 CVEs
  • Palo Alto Networks Faces Ongoing Zero-Day Threat
  • Elon Musk and OpenAI’s Legal Clash Over AI’s Future
  • Ivanti Warns of Active Exploitation in EPMM Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Daemon Tools Supply Chain Breach Managed, Says Vendor
  • PCPJack Compromises Cloud Systems Using 5 CVEs
  • Palo Alto Networks Faces Ongoing Zero-Day Threat
  • Elon Musk and OpenAI’s Legal Clash Over AI’s Future
  • Ivanti Warns of Active Exploitation in EPMM Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark