Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

US To Leave Global Forum on Cyber Expertise

January 9, 2026

VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX

January 9, 2026

AI-Powered Truman Show Operation Industrializes Investment Fraud

January 9, 2026
Facebook X (Twitter) Instagram
Saturday, January 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»China-Linked UAT-7290 Targets Telecom Networks In South Asia
News

China-Linked UAT-7290 Targets Telecom Networks In South Asia

Team-CWDBy Team-CWDJanuary 8, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A long-running cyber-espionage campaign targeting high-value telecommunications infrastructure in South Asia has been attributed to a sophisticated threat actor tracked as UAT-7290.

The activity, disclosed by Cisco Talos in an advisory published today, has been ongoing since at least 2022 and focuses on gaining deep, persistent access to networks considered strategically significant.

The campaign centers on telecommunications providers, a sector that plays a critical role in national infrastructure.

According to the report, UAT-7290 conducts extensive technical reconnaissance before launching intrusions, carefully mapping environments to maximize the effectiveness of follow-on activity.

In recent months, the group has also expanded its targeting into Southeastern Europe.

Beyond espionage, the threat actor appears to have recently established Operational Relay Box (ORB) infrastructure, effectively converting compromised systems into relay nodes that can be leveraged by other China-nexus groups. This suggests UAT-7290 functions not only as an intelligence collection operation but also as an initial access facilitator.

Cisco Talos assessed with high confidence that UAT-7290 is linked to the China-nexus of advanced persistent threat (APT) actors.

The group primarily compromises public-facing edge devices, exploiting one-day vulnerabilities in widely deployed networking products and using target-specific SSH brute-force techniques.

Rather than developing bespoke exploits, the actor appears to rely on publicly available proof-of-concept (PoC) code.

Investigators observed notable overlaps with known China-linked operations. These include similarities with RedLeaves, associated with APT10, and ShadowPad, a malware family used across multiple Chinese threat groups.

Victimology and infrastructure also overlap with Red Foxtrot, a group previously linked to a People’s Liberation Army unit.

Read more on telecommunications cyber threats: UK’s Cyber Service for Telcos Blocks One Billion Malicious Site Attempts

UAT-7290’s tooling is largely Linux-based and tailored for edge devices. The core malware families tracked by Cisco Talos include:

  • RushDrop, a dropper that initiates the infection chain

  • DriveSwitch, used to execute the primary implant

  • SilentRaid, the main backdoor that maintains persistent access

SilentRaid is modular, allowing operators to deploy capabilities such as remote shell access, file management and port forwarding based on operational needs.

Another implant, Bulbature, is used to transform compromised devices into relay infrastructure. Recent variants include a self-signed certificate that researchers identified on at least 141 hosts located in China or Hong Kong. Several of these systems have also been linked to other malware families commonly associated with China-nexus activity.

Cisco Talos said the campaign highlights the sustained focus on telecommunications networks in South Asia and underscores the strategic value of these environments to advanced threat actors.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More
Next Article Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
Team-CWD
  • Website

Related Posts

News

US To Leave Global Forum on Cyber Expertise

January 9, 2026
News

VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX

January 9, 2026
News

AI-Powered Truman Show Operation Industrializes Investment Fraud

January 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How cybercriminals are targeting content creators

November 26, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

What’s at stake if your employees post too much online

December 1, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.