Skip to content

Chinese-Backed Cyber Espionage Group UAT-7237 Targets Taiwan

Discover the tactics of UAT-7237, a Chinese-linked cyber espionage group targeting Taiwan. Learn how to protect your organization from this evolving threat.

In this image there is a store in that store there are packets and in the background there is a...
In this image there is a store in that store there are packets and in the background there is a wall, on that wall there is some text.

Chinese-Backed Cyber Espionage Group UAT-7237 Targets Taiwan

Cybersecurity researchers have discovered a sophisticated cyber espionage group, UAT-7237, suspected to have ties with Chinese state-backed entities. The group, active since 2023, has been targeting web infrastructure entities in Taiwan.

APT group UAT-7237 employs a range of tactics to gain and maintain access to targeted systems. They initially exploit unpatched servers and use Mimikatz for credential theft. To facilitate data exfiltration, they compress the stolen data. For persistence, they opt for SoftEther VPN and RDP instead of web shells, and use a customized Shellcode loader called 'SoundBill' for payload execution.

The group spreads within networks using tools like FScan and SMB scans. They maintain long-term access via SoftEther VPN, with configurations set in Simplified Chinese. UAT-7237 is also linked to UAT-5918, another info-stealing threat actor active this year.

Talos, a cybersecurity firm, has published Indicators of Compromise (IOCs) for this research on GitHub to help organizations detect and mitigate potential threats. UAT-7237's use of customized open-source tools and long-term access strategies highlights the evolving nature of cyber threats and the importance of robust cybersecurity measures.

Read also:

Latest