Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked UAT-8302 Targets Global Governments with APT Malware

China-Linked UAT-8302 Targets Global Governments with APT Malware

Posted on May 5, 2026 By CWS

A China-affiliated advanced persistent threat (APT) group, identified as UAT-8302, has been implicated in cyberattacks against government bodies in South America since late 2024 and southeastern Europe in 2025. These activities, monitored by Cisco Talos, involve the deployment of unique malware families also utilized by other cyber groups linked to China.

The malware arsenal includes a .NET-based backdoor known as NetDraft or NosyDoor, a variant of the previously identified FINALDRAFT. This tool has been associated with several threat groups like Ink Dragon and Jewelbug. ESET has attributed NosyDoor to a group they call LongNosedGoblin, while Russian firm Solar notes its use against Russian IT firms by a group dubbed Erudite Mogwai, also known as Space Pirates.

APT Malware Collaboration

Researchers from Talos, including Jungsoo An and Asheer Malhotra, have noted that UAT-8302 uses malware linked to various known threat clusters, suggesting a collaborative effort among China-aligned actors. Reports suggest these groups share tools, enhancing their capabilities to execute sophisticated cyber operations.

Though specific initial breach methods remain unclear, it is suspected that UAT-8302 exploits zero-day and N-day vulnerabilities in web applications. Post-breach, attackers conduct thorough reconnaissance using open-source tools like gogo for network mapping and lateral movement before deploying malware such as NetDraft and CloudSorcerer.

Technical Sophistication and Tools

The group has also deployed SNOWRUST, a Rust-based variant of SNOWLIGHT, to download and execute the VShell payload. In addition to custom malware, they employ tools like Stowaway and SoftEther VPN to maintain clandestine network access.

This method reflects an advanced cooperation model among Chinese cyber groups, as highlighted by Trend Micro. In a phenomenon termed ‘Premier Pass-as-a-Service,’ initial access gained by one group is handed over to another for further exploitation, complicating tracking and mitigation efforts.

Implications and Future Outlook

The collaborative tactics of UAT-8302 and associated groups emphasize a strategic approach to cyber espionage, potentially complicating global cybersecurity defenses. As these operations evolve, understanding their methodologies and strengthening international cyber defense collaborations become crucial.

Trend Micro’s investigation into ‘Premier Pass-as-a-Service’ indicates that such access sharing is limited to a select few groups, suggesting a tightly controlled operation aimed at maximizing impact while minimizing detection risks. The full scope of this model remains under study, highlighting the need for ongoing vigilance and adaptation in cybersecurity strategies.

The Hacker News Tags:advanced persistent threat, APT malware, backdoor access, China APT, CloudSorcerer, Cybersecurity, government cyberattacks, Malware, NetDraft, NosyDoor, Premier Pass-as-a-Service, Rust-based SNOWLIGHT, Trend Micro, UAT-8302, VSHell

Post navigation

Previous Post: Supply Chain Attack Targets DAEMON Tools Software
Next Post: Latvian Hacker Jailed for Karakurt Ransomware Crimes

Related Posts

Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs The Hacker News
Assessing the Role of AI in Zero Trust Assessing the Role of AI in Zero Trust The Hacker News
SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day The Hacker News
Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files The Hacker News
Pentests once a year? Nope. It’s time to build an offensive SOC Pentests once a year? Nope. It’s time to build an offensive SOC The Hacker News
Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cisco Acquires Astrix to Bolster AI Identity Security
  • Apache HTTP/2 Vulnerability Exposes Systems to RCE and DoS
  • GnuTLS 3.8.13 Update: Key Security Vulnerabilities Fixed
  • Latvian Hacker Jailed for Karakurt Ransomware Crimes
  • China-Linked UAT-8302 Targets Global Governments with APT Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cisco Acquires Astrix to Bolster AI Identity Security
  • Apache HTTP/2 Vulnerability Exposes Systems to RCE and DoS
  • GnuTLS 3.8.13 Update: Key Security Vulnerabilities Fixed
  • Latvian Hacker Jailed for Karakurt Ransomware Crimes
  • China-Linked UAT-8302 Targets Global Governments with APT Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark