Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hackers Employ Custom Malware to Target Government Data

Chinese Hackers Employ Custom Malware to Target Government Data

Posted on May 7, 2026 By CWS

A cyber threat group identified as UAT-8302, associated with China, has been reported to target government institutions across South America and Southeastern Europe. The group utilizes a combination of custom malware and readily available open-source tools to exfiltrate sensitive information.

Organized Cyber Intrusions

Since late 2024, UAT-8302 has intensified its efforts in attacking governmental entities in Southeastern Europe throughout 2025. The group’s strategy involves penetrating networks, maintaining a low profile, and extracting valuable data.

The hackers’ proficiency lies in their ability to mask their activities. By leveraging legitimate cloud services in conjunction with custom-developed malware, they complicate the differentiation between authentic network traffic and malicious actions.

Advanced Persistent Threat Tactics

Displaying significant patience, UAT-8302 conducts thorough reconnaissance of network endpoints before advancing further. This meticulous approach is typical of state-sponsored attacks targeting critical governmental infrastructures.

According to Cisco Talos researchers, UAT-8302 is a China-linked advanced persistent threat (APT) group. Their primary mission involves gaining and sustaining prolonged access to government and related sectors globally.

The analysis by Talos highlights a shared toolkit with other China-nexus groups, suggesting a close operational collaboration among these threat actors.

Malware and Techniques

Upon breaching a network, UAT-8302 executes a systematic procedure involving credential collection, Active Directory data gathering, and network mapping. They utilize tools like Impacket and custom PowerShell scripts to understand the environment thoroughly.

Among their malware arsenal, the group deploys NetDraft, a .NET-based backdoor linked to the FinDraft family, and the CloudSorcerer backdoor. This arsenal enables comprehensive control and data extraction from compromised systems.

NetDraft is particularly noteworthy for its use of a DLL side-loading method, disguising its communication with a OneDrive-based command-and-control server through Microsoft Graph API, which allows it to evade detection.

Preventive Measures Against UAT-8302

To counter UAT-8302’s tactics, government agencies are advised to enhance endpoint detection systems, scrutinize outbound cloud traffic, and conduct regular audits of scheduled tasks and DLL loading behaviors.

Monitoring unusual patterns on platforms like OneDrive and GitHub, and keeping network security tools updated, can help mitigate the risks posed by this sophisticated threat group.

As cyber threats evolve, maintaining robust cybersecurity measures and staying informed on the latest threat intelligence is critical for protecting sensitive government data.

Cyber Security News Tags:APT groups, Chinese hackers, cyber threats, Cybersecurity, data breach, government data, Malware, network security, open-source tools, UAT-8302

Post navigation

Previous Post: AI Vision Models Vulnerable to Subtle Image Manipulations
Next Post: Ivanti Warns of Active Exploitation in EPMM Vulnerability

Related Posts

New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network Cyber Security News
New Albiriox Malware Attacking Android Users to Take Complete Control of their Device New Albiriox Malware Attacking Android Users to Take Complete Control of their Device Cyber Security News
AI Exploits Lead to Global FortiGate Cybersecurity Breach AI Exploits Lead to Global FortiGate Cybersecurity Breach Cyber Security News
Microsoft SharePoint Server 0-Day Hack Hits African Treasury, Companies, and University Microsoft SharePoint Server 0-Day Hack Hits African Treasury, Companies, and University Cyber Security News
nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention Cyber Security News
Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Elon Musk and OpenAI’s Legal Clash Over AI’s Future
  • Ivanti Warns of Active Exploitation in EPMM Vulnerability
  • Chinese Hackers Employ Custom Malware to Target Government Data
  • AI Vision Models Vulnerable to Subtle Image Manipulations
  • Critical Cisco Vulnerability Exposes Networks to DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Elon Musk and OpenAI’s Legal Clash Over AI’s Future
  • Ivanti Warns of Active Exploitation in EPMM Vulnerability
  • Chinese Hackers Employ Custom Malware to Target Government Data
  • AI Vision Models Vulnerable to Subtle Image Manipulations
  • Critical Cisco Vulnerability Exposes Networks to DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark