Chinese hackers targeting ‘high value’ North American critical infrastructure, Cisco says
好的,我现在需要帮用户总结一篇关于中国黑客攻击北美关键基础设施的文章,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章提到Cisco Talos的研究人员发现,过去一年中,中国支持的黑客组织成功入侵了北美多个关键基础设施。他们使用了被泄露的凭证和可利用的服务器。这些攻击涉及零日漏洞CVE-2025-53690,影响了SiteCore的产品。此外,黑客使用了名为Earthworm的工具来建立反向隧道。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖主要攻击手段、目标、使用的漏洞和工具。同时,语言要简洁明了。 可能会这样组织:中国黑客利用泄露凭证和漏洞攻击北美关键基础设施,涉及零日漏洞和Earthworm工具。 检查一下是否符合要求:没有使用“文章内容总结”等开头,直接描述内容。字数控制在100字以内。 最终总结:中国黑客利用泄露凭证和可利用服务器入侵北美关键基础设施组织,并利用零日漏洞CVE-2025-53690进行攻击,使用Earthworm工具建立反向隧道。 </think> 中国黑客利用泄露凭证和可利用服务器入侵北美关键基础设施组织,并利用零日漏洞CVE-2025-53690进行攻击,使用Earthworm工具建立反向隧道。 2026-1-15 21:31:20 Author: therecord.media(查看原文) 阅读量:1 收藏

Chinese hackers successfully breached multiple critical infrastructure organizations in North America over the last year using a combination of compromised credentials and exploitable servers, researchers at Cisco Talos found. 

In findings published Thursday, the researchers documented a campaign starting last year where Chinese government-backed hacking groups were tasked with obtaining initial access to “high-value” organizations. Cisco Talos refers to the group as “UAT-8837.”

After getting access, the threat actors used a variety of tools to steal credentials, security configurations and other information to enable broader access to victim organizations. 

While the group has used multiple vulnerabilities to gain access, Cisco Talos tracked several intrusions involving the exploitation of CVE-2025-53690 — a bug affecting products from software company SiteCore.

The zero-day vulnerability was spotlighted by federal cybersecurity officials in the Fall, and all federal civilian agencies were ordered to patch the bug by September 25. At the time, Google published its own examination of an incident involving the bug and mentioned at least four of the same post-exploitation tools that were highlighted by Cisco Talos. 

Cisco Talos said the group’s targeting of the bug indicates the Chinese group “may have access to zero-day exploits.”

One of the tools used by the hacking group, called Earthworm, allows threat actors to expose internal endpoints to attacker-owned remote infrastructure. Cisco Talos said Earthworm has been used extensively by Chinese-speaking threat actors during intrusions in order to determine which internal endpoints are undetectable by endpoint protection products.

“The undetected version is then used to create a reverse tunnel to attacker-controlled servers,” they explained. 

Concerns about Chinese hackers targeting critical infrastructure were revived following an incident in December when the group Salt Typhoon was detected compromising an email platform used by Congressional staffers. 

The staffers targeted in the attacks work on the House of Representatives’ China committee and several others covering foreign affairs. U.S. officials have repeatedly warned of Chinese government-backed hacking groups targeting federal agencies and other critical infrastructure organizations. 

On Wednesday, a group of Western cyber agencies released an alert about the growing digital threats facing the operational technology at the heart of industrial systems used by many critical infrastructure organizations. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/china-hackers-apt-cisco-talos
如有侵权请联系:admin#unsafe.sh