China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章主要讲的是一个与中国有关的威胁行为者,他们针对北美关键基础设施进行网络间谍活动。这个威胁行为者被Cisco Talos命名为UAT-8837,他们利用零日漏洞和开源工具来获取初始访问权限,并进行后续的侦察和数据窃取。 接下来,我需要提取关键信息:威胁行为者的背景、目标、使用的工具和漏洞。然后,把这些信息浓缩成简短的句子,确保不超过100字。 要注意不要使用“文章内容总结”这样的开头,直接描述即可。同时,保持语言简洁明了,让读者一目了然。 最后,检查一下字数是否符合要求,并确保没有遗漏重要信息。 </think> 中国关联的网络威胁行为者UAT-8837针对北美关键基础设施展开网络间谍活动,利用零日漏洞和开源工具获取初始访问权限并窃取敏感信息。该组织主要目标是高价值机构,通过收集凭据、安全配置和Active Directory信息扩大对受害者的访问渠道。近期活动显示其可能掌握零日漏洞利用能力。 2026-1-16 07:18:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Zero-Day / Cyber Espionage

A threat actor likely aligned with China has been observed targeting critical infrastructure sectors in North America since at least last year.

Cisco Talos, which is tracking the activity under the name UAT-8837, assessed it to be a China-nexus advanced persistent threat (APT) actor with medium confidence based on tactical overlaps with other campaigns mounted by threat actors from the region.

The cybersecurity company noted that the threat actor is "primarily tasked with obtaining initial access to high-value organizations," based on the tactics, techniques, and procedures (TTPs) and post-compromise activity observed.

"After obtaining initial access — either by successful exploitation of vulnerable servers or by using compromised credentials — UAT-8837 predominantly deploys open-source tools to harvest sensitive information such as credentials, security configurations, and domain and Active Directory (AD) information to create multiple channels of access to their victims," it added.

UAT-8837 is said to have most recently exploited a critical zero-day vulnerability in Sitecore (CVE-2025-53690, CVSS score: 9.0) to obtain initial access, with the intrusion sharing TTP, tooling, and infrastructure similarities with a campaign detailed by Google-owned Mandiant in September 2025.

Cybersecurity

While it's not clear if these two clusters are the work of the same actor, it suggests that UAT-8837 may have access to zero-day exploits to conduct cyber attacks.

Once the adversary obtains a foothold in target networks, it conducts preliminary reconnaissance, followed by disabling RestrictedAdmin for Remote Desktop Protocol (RDP), a security feature that ensures credentials and other user resources aren't exposed to compromised remote hosts.

UAT-8837 is also said to open "cmd.exe" to conduct hands-on keyboard activity on the infected host and download several artifacts to enable post-exploitation. Some of the notable artifacts include -

  • GoTokenTheft, to steal access tokens
  • EarthWorm, to create a reverse tunnel to attacker-controlled servers using SOCKS
  • DWAgent, to enable persistent remote access and Active Directory reconnaissance
  • SharpHound, to collect Active Directory information
  • Impacket, to run commands with elevated privileges
  • GoExec, a Golang-based tool to execute commands on other connected remote endpoints within the victim's network
  • Rubeus, a C# based toolset for Kerberos interaction and abuse
  • Certipy, a tool for Active Directory discovery and abuse

"UAT-8837 may run a series of commands during the intrusion to obtain sensitive information, such as credentials from victim organizations," researchers Asheer Malhotra, Vitor Ventura, and Brandon White said.

"In one victim organization, UAT-8837 exfiltrated DLL-based shared libraries related to the victim's products, raising the possibility that these libraries may be trojanized in the future. This creates opportunities for supply chain compromises and reverse engineering to find vulnerabilities in those products."

The disclosure comes a week after Talos attributed another China-nexus threat actor known as UAT-7290 to espionage-focused intrusions against entities in South Asia and Southeastern Europe using malware families such as RushDrop, DriveSwitch, and SilentRaid.

Cybersecurity

In recent years, concerns about Chinese threat actors targeting critical infrastructure have prompted Western governments to issue several alerts. Earlier this week, cybersecurity and intelligence agencies from Australia, Germany, the Netherlands, New Zealand, the U.K., and the U.S. warned about the growing threats to operational technology (OT) environments.

The guidance offers a framework to design, secure, and manage connectivity in OT systems, urging organizations to limit exposure, centralize and standardize network connections, use secure protocols, harden OT boundary, ensure all connectivity is monitored and logged, and avoid using obsolete assets that could heighten the risk of security incidents.

"Exposed and insecure OT connectivity is known to be targeted by both opportunistic and highly capable actors," the agencies said. "This activity includes state-sponsored actors actively targeting critical national infrastructure (CNI) networks. The threat is not just limited to state-sponsored actors with recent incidents showing how exposed OT infrastructure is opportunistically targeted by hacktivists."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/china-linked-apt-exploits-sitecore-zero.html
如有侵权请联系:admin#unsafe.sh