Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The case for and against influencer-led Super Bowl ads

    Future of TV Briefing: Brands are spending more to advertise creators’ content, making usage rights a focal point

    After an oversaturation of AI-generated content, creators’ authenticity and ‘messiness’ are in high demand

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026

      The mother of one of Elon Musk’s children says his AI bot won’t stop creating sexualized images of her

      January 7, 2026

      A new pope, political shake-ups and celebs in space: The 2025-in-review news quiz

      December 31, 2025

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025

      Trump signs executive order seeking to ban states from regulating AI companies

      December 13, 2025
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Bitcoin Hits 50-Day High as US–Iran War Tensions Escalate

      January 14, 2026

      Cardano Whales Buy 100 Million ADA, but Price Still Struggles Below $0.40

      January 14, 2026

      Amended CLARITY Act Bill Frustrates the Crypto Community: Who Really Benefits?

      January 14, 2026

      How Nvidia’s Rubin Chips Could Boost Bittensor Adoption in 2026

      January 14, 2026

      Ethereum Loses Out On $116 Million, But Price Remains Steady Above $3,000

      January 14, 2026
    • Technology

      The case for and against influencer-led Super Bowl ads

      January 14, 2026

      Future of TV Briefing: Brands are spending more to advertise creators’ content, making usage rights a focal point

      January 14, 2026

      After an oversaturation of AI-generated content, creators’ authenticity and ‘messiness’ are in high demand

      January 14, 2026

      Walmart says ‘open partnerships’ are central to its AI strategy, while Amazon goes it alone

      January 14, 2026

      ‘Intentionally being cautious’: Why the ad industry isn’t ready to let AI agents spend ad dollars

      January 14, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»New China-linked hackers breach telcos using edge device exploits
    Technology

    New China-linked hackers breach telcos using edge device exploits

    TechAiVerseBy TechAiVerseJanuary 9, 2026No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    New China-linked hackers breach telcos using edge device exploits
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    New China-linked hackers breach telcos using edge device exploits

    A sophisticated threat actor that uses Linux-based malware to target telecommunications providers has recently broadened its operations to include organizations in Southeastern Europe.

    Tracked internally by Cisco Talos as UAT-7290, the actor shows strong China nexus indicators and typically focuses on telcos in South Asia in cyber-espionage operations.

    Active since at least 2022, the UAT-7290 group also serves as an initial access group by establishing an Operational Relay Box (ORB) infrastructure during the attacks, which is then utilized by other China-aligned threat actors.

    According to the researchers, the hackers conduct extensive reconnaissance before a breach and deploy a mix of custom and open-source malware and public exploits for known flaws in edge network devices.

    “UAT-7290 leverages one-day exploits and target-specific SSH brute force to compromise public-facing edge devices to gain initial access and escalate privileges on compromised systems,” Cisco Talos says in a report today.

    UAT-7290 arsenal

    UAT-7290 primarily uses a Linux-based malware suite, with occasional deployments of Windows implants such as RedLeaves and ShadowPad, which are widely shared among multiple China-nexus actors.

    Cisco highlights the following Linux malware families, linking them to UAT-7290:

    • RushDrop (ChronosRAT) – Initial dropper that begins the infection chain. Performs basic anti-VM checks, creates or verifies a hidden .pkgdb directory, and decodes three binaries embedded inside: daytime (DriveSwitch executor), chargen (the SilentRaid implant), and busybox, a legitimate Linux utility abused for command execution.
    • DriveSwitch – Peripheral component dropped by RushDrop with the primary function to execute the SilentRaid implant on the compromised system.
    • SilentRaid (MystRodX) – The main persistent implant, written in C++ and built around a plugin-based design. It performs basic anti-analysis checks, resolves its C2 domain using Google’s public DNS resolver; supports remote shell access, port forwarding, file operations, directory archiving with tar, access to /etc/passwd, and collection of X.509 certificate attributes.
    • Bulbature – A Linux-based UPX-packed implant previously documented by Sekoia, used to convert compromised devices into Operational Relay Boxes (ORBs). It listens on configurable ports, opens reverse shells, and stores C2 configuration in /tmp/*.cfg, supports C2 rotation, and uses a self-signed TLS certificate.

    The Bulbature TLS certificate, which is the same as the one Sekoia documented previously, is found on 141 China- and Hong Kong-based hosts, whose IPs have been associated with other malware families such as SuperShell, GobRAT, and Cobalt Strike beacons.

    Cisco Talos’ report provides technical details about the malware used by UAT-7290, along with a list of indicators of compromise to help organizations defend against this threat actor.

    Secrets Security Cheat Sheet: From Sprawl to Control

    Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

    Get the cheat sheet and take the guesswork out of secrets management.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleFBI warns about Kimsuky hackers using QR codes to phish U.S. orgs
    Next Article Gmail’s new AI Inbox uses Gemini, but Google says it won’t train AI on user emails
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    The case for and against influencer-led Super Bowl ads

    January 14, 2026

    Future of TV Briefing: Brands are spending more to advertise creators’ content, making usage rights a focal point

    January 14, 2026

    After an oversaturation of AI-generated content, creators’ authenticity and ‘messiness’ are in high demand

    January 14, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025602 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025230 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025134 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025109 Views
    Don't Miss
    Technology January 14, 2026

    The case for and against influencer-led Super Bowl ads

    The case for and against influencer-led Super Bowl adsThis story is part of Digiday’s annual…

    Future of TV Briefing: Brands are spending more to advertise creators’ content, making usage rights a focal point

    After an oversaturation of AI-generated content, creators’ authenticity and ‘messiness’ are in high demand

    Walmart says ‘open partnerships’ are central to its AI strategy, while Amazon goes it alone

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The case for and against influencer-led Super Bowl ads

    January 14, 20260 Views

    Future of TV Briefing: Brands are spending more to advertise creators’ content, making usage rights a focal point

    January 14, 20260 Views

    After an oversaturation of AI-generated content, creators’ authenticity and ‘messiness’ are in high demand

    January 14, 20260 Views
    Most Popular

    What to Know and Where to Find Apple Intelligence Summaries on iPhone

    March 12, 20250 Views

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    Senua’s Saga: Hellblade 2 leads BAFTA Game Awards 2025 nominations

    March 12, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.