China-linked UAT-7290 spies on telco in South Asia and Europe using modular malware
嗯,用户让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要通读这篇文章,抓住主要信息。 文章讲的是一个与中国有关的网络威胁组织UAT-7290,他们从2022年开始针对南亚和东南欧的电信公司进行间谍活动。他们使用了多种恶意软件,比如RushDrop、DriveSwitch和SilentRaid。这些工具帮助他们在目标网络中建立持久访问,并且还提供了初始访问的能力。 此外,文章提到UAT-7290使用的基础设施和技术手法与一些已知的中国相关威胁组织如APT10和Red Foxtrot有重叠,这些组织被认为与中国军方有关联。报告中还提到了一些恶意软件的功能和攻击链的细节。 所以,我需要把这些关键点浓缩到100字以内。要包括威胁组织名称、目标地区、目标行业、使用的恶意软件、攻击手法以及与其他中国相关组织的关联。 可能的结构是:首先介绍威胁组织及其活动时间和地区;然后说明主要目标和使用的工具;最后提到与其他已知组织的关联。 这样就能在有限的字数内涵盖所有重要信息了。 </think> 中国关联网络威胁组织UAT-7290自2022年起针对南亚及东南欧电信行业实施间谍活动,利用RushDrop、DriveSwitch及SilentRaid等模块化恶意软件渗透目标网络,并构建用于后续攻击的基础设施。其技术手法及基础设施与APT10、Red Foxtrot等中国相关威胁组织重叠。 2026-1-9 09:47:7 Author: securityaffairs.com(查看原文) 阅读量:4 收藏

China-linked UAT-7290 spies on telco in South Asia and Europe using modular malware

China-linked UAT-7290 has targeted South Asia and Southeastern Europe since 2022, conducting espionage and deploying RushDrop, DriveSwitch, and SilentRaid.

China-linked threat actor UAT-7290 has conducted espionage attacks since at least 2022, targeting South Asia and Southeastern Europe.

UAT-7290 primarily targets telecom providers, it conducts espionage by deeply embedding in victim networks and also operates Operational Relay Box (ORB) infrastructure later reused by other China-nexus actors, suggesting a dual role as both espionage and initial-access provider.

The threat actor uses a broad toolset, including open-source tools, custom malware, and one-day exploits against edge networking devices, favoring Linux malware but also deploying Windows implants like RedLeaves and ShadowPad. Attacks are preceded by extensive reconnaissance and rely on PoC exploits and SSH brute force. Its TTPs, infrastructure, and victimology overlap with known China-aligned groups such as APT10 and Red Foxtrot, linked to PLA Unit 69010.

“Talos currently tracks the Linux-based malware families associated with UAT-7290 in this intrusion as:

  • RushDrop – The dropper that kickstarts the infection chain. RushDrop is also known as ChronosRAT.
  • DriveSwitch – A peripheral malware used to execute the main implant on the infected system.
  • SilentRaid – The main implant in the intrusion meant to establish persistent access to compromised endpoints. It communicates with its command-and-control server (C2) and carries out tasks defined in the malware. SilentRaid is also known as MystRodX.” reads the report published by Cisco Talos.

“Another malware implanted on compromised devices by UAT-7290 is Bulbature. Bulbature, first disclosed by Sekoia in late 2024, is an implant that is used to convert compromised devices into ORBs.”

The attack chain starts with RushDrop, a dropper that checks for sandboxes and then creates a hidden folder to deploy three components: DriveSwitch, SilentRaid, and a legitimate BusyBox utility.

The role of DriveSwitch is to launch SilentRaid, the main backdoor. SilentRaid is modular malware that contacts a command-and-control server and executes tasks through built-in plugins. These plugins enable remote shells, file access, port forwarding, command execution, and data collection, including system files and certificate details. Another tool, Bulbature, provides additional backdoor capabilities, gathers system info, manages multiple C2 addresses, and opens reverse shells. Bulbature uses hardcoded or encoded C2 data and, in recent versions, a self-signed certificate linked to infrastructure in China and Hong Kong, commonly associated with China-nexus threat actors.

“we have observed technical indicators that overlap with RedLeaves, a malware family attributed to APT10 (a.k.a. MenuPass, POTASSIUM and Purple Typhoon), as well as infrastructure associated with ShadowPad, a malware family used by a variety of China-nexus adversaries.” concludes the report.

“Additionally, UAT-7290 shares a significant amount of overlap in victimology, infrastructure, and tooling with a group publicly reported by Recorded Future as Red Foxtrot. In a 2021 report, Recorded Future linked Red Foxtrot to Chinese People’s Liberation Army (PLA) Unit 69010.”

The report includes indicators of compromise (IoCs).

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, China)




文章来源: https://securityaffairs.com/186698/security/china-linked-uat-7290-spies-on-telco-in-south-asia-and-europe-using-modular-malware.html
如有侵权请联系:admin#unsafe.sh