By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
Tech News

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

By Viral Trending Content 4 Min Read
Share
SHARE

Jan 08, 2026Ravie LakshmananMalware / Threat Intelligence

A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe.

The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the deployment of malware families such as RushDrop, DriveSwitch, and SilentRaid, according to a Cisco Talos report published today.

“In addition to conducting espionage-focused attacks where UAT-7290 burrows deep inside a victim enterprise’s network infrastructure, their tactics, techniques, and procedures (TTPs) and tooling suggest that this actor also establishes Operational Relay Box (ORBs) nodes,” researchers Asheer Malhotra, Vitor Ventura, and Brandon White said.

“The ORB infrastructure may then be used by other China-nexus actors in their malicious operations, signifying UAT-7290’s dual role as an espionage-motivated threat actor as well as an initial access group.”

Cybersecurity

Attacks mounted by the adversary have mainly targeted telecommunications providers in South Asia. However, recent intrusion waves have branched out to strike organizations in Southeastern Europe.

UAT-7290’s tradecraft is broad as it’s varied, relying on a combination of open-source malware, custom tooling, and payloads for one-day vulnerabilities in popular edge networking products. Some of the notable Windows implants put to use by the threat actor include RedLeaves (aka BUGJUICE) and ShadowPad, both exclusively linked to Chinese hacking groups.

That said, the group mainly leverages a Linux-based malware suite comprising –

  • RushDrop (aka ChronosRAT), a dropper that initiates the infection chain
  • DriveSwitch, a peripheral malware that’s used to execute SilentRaid on the infected system
  • SilentRaid (aka MystRodX), a C++-based implant that establishes persistent access to compromised endpoints and employs a plugin-like approach to communicate with an external server, open a remote shell, set up port forwarding, and perform file operations

It’s worth noting that a prior analysis from QiAnXin XLab flagged MystRodX as a variant of ChronosRAT, a modular ELF binary that’s capable of shellcode execution, file management, keylogging, port forwarding, remote shell, screenshot capture, and proxy. Palo Alto Networks Unit 42 is tracking the associated threat cluster under the moniker CL-STA-0969.

Cybersecurity

Also deployed by UAT-7290 is a backdoor called Bulbature that’s engineered to transform a compromised edge device into an ORBs. It was first documented by Sekoia in October 2024.

The cybersecurity company said the threat actor shares tactical and infrastructure overlaps with China-linked adversaries known as Stone Panda and RedFoxtrot (aka Nomad Panda).

“The threat actor conducts extensive reconnaissance of target organizations before carrying out intrusions. UAT-7290 leverages one-day exploits and target-specific SSH brute force to compromise public-facing edge devices to gain initial access and escalate privileges on compromised systems,” the researchers said. “The actor appears to rely on publicly available proof-of-concept exploit code as opposed to developing their own.”

You Might Also Like

Samsung Galaxy A27 Appears on Geekbench ahead of Launch

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

SpaceX confidentially files for US IPO – reports

Ray-Ban Meta 123.1: New AI Features & Known Glitches

Doctor Who Lost Episodes: When And Where To Watch

TAGGED: Advanced Persistent Threats, cyber espionage, Cyber Security, Cybersecurity, Internet, Linux, Malware, network security, Threat Intelligence, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Huge anti-government protests in Tehran and other Iranian cities, videos show
Next Article Bitcoin is now 56.7% green: Here’s how it could get even cleaner
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Artemis II astronauts begin historic journey to the moon
World News
Samsung Galaxy A27 Appears on Geekbench ahead of Launch
Tech News
CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards
Tech News
4 Takeaways From Day 2 of the 2026 College Basketball Crown
Sports
Losing $1 billion a day: Gurmeet Chadha urges PMO, Finance Ministry to revisit capital gains tax, STT
Business
Crypto hackers steal $169M from 34 DeFi protocols in Q1: DefiLlama
Crypto
Tehran fires at Israel as Trump warns US has not started ‘destroying what is left’ in Iran
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Samsung Galaxy A27 Appears on Geekbench ahead of Launch

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Samsung Galaxy A27 Appears on Geekbench ahead of Launch
April 3, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?