China-linked APT group uses shared malware against governments

Summary: Sophisticated APT group linked to China is attributed attacks against governments in South America and Europe, using the name UAT-8302. This group deploys malware previously used by other China-aligned hacking organizations.

China-linked group targets Linux systems and SonicWall firewalls in new cyberespionage campaign

Cybersecurity researchers detected a new campaign attributed to the threat group UAT-8302, allegedly linked to China, which is attacking Linux systems and Sonic Wall devices using custom malware and advanced persistence techniques.

The operation, revealed by The Hacker News, again shows how state actors continue to focus on critical infrastructure and perimeter devices to gain prolonged access to corporate and government networks.

Campaign Objectives

The observed attacks are mainly directed against:

  • Linux servers exposed to the Internet,
  • SonicWall security appliances,
  • Corporate network infrastructure,
  • Remote access systems.

The group utilizes malware designed specifically to maintain persistence and facilitate long-term espionage operations.

Tools used by UAT-8302

Researchers identified several malicious tools used during the campaign, including:

  • Backdoors for Linux,
  • Web shells,
  • Reconnaissance scripts,
  • Detection evasion mechanisms.

The attackers aim to maintain silent access to compromised systems while collecting information and expanding their presence within the network.

Furthermore, the observed infrastructure suggests carefully organized operations geared towards espionage rather than immediate financial gain.

Firewalls and appliances: an increasingly common target

Perimeter devices continue to be a favorite target for APT groups because:

  • They are often directly exposed to the Internet,
  • They possess high privileges,
  • They handle sensitive traffic,
  • They often receive less monitoring than traditional endpoints.

Over recent years, multiple nation-state linked campaigns have exploited vulnerabilities in:

  • Firewalls,
  • VPNs,
  • SSL gateways,
  • MDM solutions,
  • Enterprise security appliances.

The main objective is typically to gain persistent access and avoid traditional EDR detection mechanisms.

Linux under attack

Although many organizations focus their defenses on Windows, attacks targeting Linux are rapidly growing, especially in:

  • Cloud servers,
  • Containers,
  • DevOps infrastructure,
  • Critical enterprise systems.

Advanced actors take advantage of the fact that many Linux environments possess:

  • Limited monitoring,
  • Weak configurations,
  • Outdated software,
  • Less mature defensive tools.
Indicators of an espionage operation

According to researchers, several elements point to cyberespionage motives:

  • Long-term persistence,
  • Low operational profile,
  • Custom malware,
  • Selective targeting,
  • Carefully segmented infrastructure.

This type of campaign usually focuses on stealing strategic information, long-term access, and intelligence gathering.

Security Recommendations

Experts recommend:

  • Immediately updating SonicWall devices and Linux systems,
  • Restricting administrative access from the Internet,
  • Monitoring anomalous activity on firewalls,
  • Reviewing historical logs,
  • Implementing network segmentation,
  • Using multi-factor authentication,
  • Deploying advanced detection on Linux servers.

It is also advised to check indicators of compromise published by researchers to identify possible prior infections.

The growth of espionage on critical infrastructure

The campaign attributed to UAT-8302 reflects an increasingly visible trend: state actors are prioritizing the silent infiltration of perimeter infrastructure and Linux servers to sustain long-term intelligence operations.

In a global context where APT threats continue to grow, protecting security appliances and Linux systems is becoming as critical as defending traditional endpoints.

Key facts

  • The UAT-8302 group was reported for attacks in South America (since 2024) and Europe (since 2025).
  • The malware includes NetDraft, a .NET backdoor, associated with clusters like Ink Dragon.
  • The group uses tools like CloudSorcerer and SNOWLIGHT against multiple entities.
  • The attackers access tools from several sophisticated APT groups, with Chinese ties.

Why it matters

The use of shared malware and tools from multiple APT groups indicates that UAT-8302 operates with an advanced level of access to sophisticated cyber infrastructure. This utilization of shared tools makes defense more complex, as mitigation must cover multiple attack vectors known in various regions.

X profile@thehackersnewshttps://twitter.com/thehackersnews
Embedded content for: China-linked APT group uses shared malware against governments