Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

Posted on January 8, 2026January 8, 2026 By CWS

Jan 08, 2026Ravie LakshmananMalware / Menace Intelligence
A China-nexus risk actor often called UAT-7290 has been attributed to espionage-focused intrusions in opposition to entities in South Asia and Southeastern Europe.
The exercise cluster, which has been energetic since a minimum of 2022, primarily focuses on intensive technical reconnaissance of goal organizations earlier than initiating assaults, finally resulting in the deployment of malware households reminiscent of RushDrop, DriveSwitch, and SilentRaid, in accordance with a Cisco Talos report revealed right this moment.
“Along with conducting espionage-focused assaults the place UAT-7290 burrows deep inside a sufferer enterprise’s community infrastructure, their techniques, strategies, and procedures (TTPs) and tooling recommend that this actor additionally establishes Operational Relay Field (ORBs) nodes,” researchers Asheer Malhotra, Vitor Ventura, and Brandon White stated.
“The ORB infrastructure might then be utilized by different China-nexus actors of their malicious operations, signifying UAT-7290’s twin function as an espionage-motivated risk actor in addition to an preliminary entry group.”

Assaults mounted by the adversary have primarily focused telecommunications suppliers in South Asia. Nonetheless, latest intrusion waves have branched out to strike organizations in Southeastern Europe.
UAT-7290’s tradecraft is broad because it’s diversified, counting on a mixture of open-source malware, customized tooling, and payloads for 1-day vulnerabilities in fashionable edge networking merchandise. A number of the notable Home windows implants put to make use of by the risk actor embrace RedLeaves (aka BUGJUICE) and ShadowPad, each solely linked to Chinese language hacking teams.
That stated, the group primarily leverages a Linux-based malware suite comprising –

RushDrop (aka ChronosRAT), a dropper that initiates the an infection chain
DriveSwitch, a peripheral malware that is used to execute SilentRaid on the contaminated system
SilentRaid (aka MystRodX), a C++-based implant that establishes persistent entry to compromised endpoints and employs a plugin-like method to speak with an exterior server, open a distant shell, arrange port forwarding, and carry out file operations

It is price noting {that a} prior evaluation from QiAnXin XLab flagged MystRodX as a variant of ChronosRAT, a modular ELF binary that is able to shellcode execution, file administration, keylogging, port forwarding, distant shell, screenshot seize, and proxy. Palo Alto Networks Unit 42 is monitoring the related risk cluster beneath the moniker CL-STA-0969.

Additionally deployed by UAT-7290 is a backdoor known as Bulbature that is engineered to remodel a compromised edge system into an ORBs. It was first documented by Sekoia in October 2024.
The cybersecurity firm stated the risk actor shares tactical and infrastructure overlaps with China-linked adversaries often called Stone Panda and RedFoxtrot (aka Nomad Panda).
“The risk actor conducts intensive reconnaissance of goal organizations earlier than finishing up intrusions. UAT-7290 leverages one-day exploits and target-specific SSH brute power to compromise public-facing edge units to achieve preliminary entry and escalate privileges on compromised techniques,” the researchers stated. “The actor seems to depend on publicly out there proof-of-concept exploit code versus creating their very own.”

The Hacker News Tags:ChinaLinked, Linux, Malware, Nodes, ORB, Targets, Telecoms, UAT7290

Post navigation

Previous Post: Rethinking Security for Agentic AI
Next Post: Microsoft Enforces Mandatory MFA for Microsoft 365 Admin Center Logins

Related Posts

Why the New AI Browsers War is a Nightmare for Security Teams Why the New AI Browsers War is a Nightmare for Security Teams The Hacker News
Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack The Hacker News
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild The Hacker News
Optimize Your SOC: Build, Buy, or Automate? Optimize Your SOC: Build, Buy, or Automate? The Hacker News
Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware The Hacker News
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch 251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News