UAT-8302: Chinese APT Group Attacking Governments in Latin America and Europe

ARCHIVE This story is marked as archive content due to its age and may not reflect the current state of events.

Summary: Cisco Talos identified UAT-8302, a sophisticated Chinese-linked APT group, which has been attacking governments in South America since late 2024 and governmental agencies in Southeast Europe since 2025.

UAT-8302: the group combining espionage and cybercrime with increasingly stealthy techniques

A recent Cisco Talos report focuses on UAT-8302, a threat actor notable for its ability to operate discreetly while combining espionage objectives with financial motives. This duality makes it a particularly difficult adversary to detect and classify.

A hybrid threat in evolution

Unlike traditional groups—clearly focused on state espionage or cybercrime—UAT-8302 sits in an intermediate point. Its campaigns show characteristics of both worlds:

  • Collecting strategic information
  • Stealing credentials and monetizable data
  • Achieving prolonged persistence in compromised systems
  • Using advanced evasion techniques
How they operate: a multi-stage attack

The analysis describes a well-structured attack cycle:

1. Initial Access

The group primarily uses:

  • Spear phishing with malicious attachments
  • Documents designed to deceive specific users
  • Possible exploitation of known vulnerabilities

2. Execution and Deployment

Once inside, the attackers execute tools that allow them to establish control over the system.

3. Persistence

Mechanisms are implemented to maintain long-term access, even after reboots or cleanup attempts.

4. Command and Control (C2) Communication

The malware connects to command and control servers to receive instructions.

5. Data Exfiltration

Finally, the collected data is sent out of the compromised network.

Key techniques that hinder detection

UAT-8302 is notable for using tactics designed to go unnoticed:

  • Living off the land (LotL): use of legitimate system tools
  • Distributed infrastructure to hide the origin
  • Encrypted communications
  • Modular malware payload depending on the objective
  • Low operational profile to avoid alerts

These techniques significantly reduce the visibility of the attack on traditional security systems.

Group objectives

The report suggests that UAT-8302 is not limited to a single type of victim. Its objectives include:

  • Organizations with sensitive information
  • Corporate environments with access to financial data
  • Users with valuable credentials
  • Infrastructure that can be repurposed for attacks

This diversity reinforces its hybrid nature between espionage and cybercrime.

Why this actor is especially relevant

UAT-8302 represents a growing trend in cybersecurity:

  • Blurring the line between state and criminal attacks
  • Prioritizing discretion over speed
  • Leveraging both technical flaws and human errors
  • Adapting quickly to different environments

This forces organizations to rethink their defensive strategies.

Defense recommendations

For organizations:

  • Implement continuous activity monitoring
  • Detect anomalous behaviors (not just signatures)
  • Limit user privileges
  • Segment critical networks
  • Proactively review logs

For security teams:

  • Identify unusual use of legitimate tools
  • Analyze outbound traffic
  • Detect connections to suspicious infrastructure
  • Conduct incident response exercises
A clear sign of the shift in the threat landscape

The UAT-8302 case shows that modern attackers no longer fit into simple categories. The convergence of espionage and cybercrime is giving rise to more versatile, persistent, and difficult-to-attribute actors.

The Cisco Talos report makes it clear that defense can no longer rely solely on traditional tools: it requires a dynamic, adaptive, and behavior-focused approach.

Key facts

  • UAT-8302 has been attacking governments in South America since late 2024.
  • The group uses backdoors like NetDraft, a .NET-based malware.
  • Their attacks include the use of VSHELL, SNOWLIGHT, and SNOWRUST.
  • Talos assesses UAT-8302 as a persistent Chinese-linked threat.

Why it matters

The attack pattern of UAT-8302, using multiple Chinese-linked malware families, suggests that long-term access to critical government infrastructures is at risk. Organizations must review their defenses against .NET backdoors and advanced stagers to prevent the theft of sensitive information.