By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools
Tech News

Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools

By Viral Trending Content 4 Min Read
Share
SHARE

Aug 15, 2025Ravie LakshmananMalware / Open Source

Open-Source Hacking Tools

A Chinese-speaking advanced persistent threat (APT) actor has been observed targeting web infrastructure entities in Taiwan using customized versions of open-sourced tools with an aim to establish long-term access within high-value victim environments.

The activity has been attributed by Cisco Talos to an activity cluster it tracks as UAT-7237, which is believed to be active since at least 2022. The hacking group is assessed to be a sub-group of UAT-5918, which is known to be attacking critical infrastructure entities in Taiwan as far back as 2023.

“UAT-7237 conducted a recent intrusion targeting web infrastructure entities within Taiwan and relies heavily on the use of open-sourced tooling, customized to a certain degree, likely to evade detection and conduct malicious activities within the compromised enterprise,” Talos said.

Cybersecurity

The attacks are characterized by the use of a bespoke shellcode loader dubbed SoundBill that’s designed to decode and launch secondary payloads, such as Cobalt Strike.

Despite the tactical overlaps with UAT-5918, UAT-7237’s tradecraft exhibits notable deviations, including its reliance on Cobalt Strike as a primary backdoor, the selective deployment of web shells after initial compromise, and the incorporation of direct remote desktop protocol (RDP) access and SoftEther VPN clients for persistent access.

The attack chains begin with the exploitation of known security flaws against unpatched servers exposed to the internet, followed by conducting initial reconnaissance and fingerprinting to determine if the target is of interest to the threat actors for follow-on exploitation.

“While UAT-5918 immediately begins deploying web shells to establish backdoored channels of access, UAT-7237 deviates significantly, using the SoftEther VPN client (similar to Flax Typhoon) to persist their access, and later access the systems via RDP,” researchers Asheer Malhotra, Brandon White, and Vitor Ventura said.

Once this step is successful, the attacker pivots to other systems across the enterprise to expand their reach and carry out further activities, including the deployment of SoundBill, a shellcode loader based on VTHello, for launching Cobalt Strike.

Also deployed on compromised hosts is JuicyPotato, a privilege escalation tool widely used by various Chinese hacking groups, and Mimikatz to extract credentials. In an interesting twist, subsequent attacks have leveraged an updated version of SoundBill that embeds a Mimikatz instance into it in order to achieve the same goals.

Besides using FScan to identify open ports against IP subnets, UAT-7237 has been observed attempting to make Windows Registry changes to disable User Account Control (UAC) and turn on storage of cleartext passwords.

“UAT-7237 specified Simplified Chinese as the preferred display language in their [SoftEther] VPN client’s language configuration file, indicating that the operators were proficient with the language,” Talos noted.

Identity Security Risk Assessment

The disclosure comes as Intezer said it discovered a new variant of a known backdoor called FireWood that’s associated with a China-aligned threat actor called Gelsemium, albeit with low confidence.

FireWood was first documented by ESET in November 2024, detailing its ability to leverage a kernel driver rootkit module called usbdev.ko to hide processes, and run various commands sent by an attacker-controlled server.

“The core functionality of the backdoor remains the same but we did notice some changes in the implementation and the configuration of the backdoor,” Intezer researcher Nicole Fishbein said. “It is unclear if the kernel module was also updated as we were not able to collect it.”

You Might Also Like

A Collision With Space Debris Leaves 3 Chinese Astronauts Stranded in Orbit

DoorDash email spoofing vulnerability sparks messy disclosure dispute

Keychain announcing new funding from top UK retailers and launches AI OS for retailers

Google SIMA 2 AI Self-Improvement AI, AGI Progress & Questions

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

TAGGED: Advanced Persistent Threat, China, Cobalt Strike, Cyber Security, Cybersecurity, Internet, Malware, Open Source, privilege escalation, VPN, Web Infrastructure
Share This Article
Facebook Twitter Copy Link
Previous Article ‘Godfather of AI’ says tech companies aren’t concerned with the AI endgame. They’re focused on short-term profits instead
Next Article Esri Ireland and Murphy Geospatial to accelerate rollout of vital infrastructure projects
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Is Europe’s mega defence project FCAS in danger of failing over Germany-France disagreements?
World News
I asked ChatGPT for the penny share with the biggest potential and this is what it found!
Business
A Collision With Space Debris Leaves 3 Chinese Astronauts Stranded in Orbit
Tech News
DoorDash email spoofing vulnerability sparks messy disclosure dispute
Tech News
Strategy adds $835M in Bitcoin even as BTC price continues decline
Crypto
Falcons' Michael Penix Reportedly Could Miss Season, Drake London to Miss Time
Sports
Tom Cruise: Photos of the ‘Mission: Impossible’ Actor
Celebrity

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Is Europe’s mega defence project FCAS in danger of failing over Germany-France disagreements?

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Is Europe’s mega defence project FCAS in danger of failing over Germany-France disagreements?
November 17, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?