• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Others

Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets

Jane Doe by Jane Doe
August 19, 2025
in Others
Share on FacebookShare on Twitter

A newly identified Chinese Advanced Persistent Threat (APT) group is systematically targeting web hosting firms in Taiwan, seeking to establish a long-term foothold for espionage and data theft. According to a recent report from Cisco Talos, the threat actor, tracked as UAT-7237, has successfully compromised at least one Taiwanese web hosting provider, demonstrating a clear focus on gaining access to high-value targets.

The attacks, which are part of a broader escalation of cyber intrusions against critical infrastructure in Taiwan, exploit known vulnerabilities on unpatched, internet-facing servers to gain initial access. Once inside the network, UAT-7237 deviates from the tactics of related Chinese groups by leveraging legitimate software, such as the SoftEther VPN client, to maintain a persistent presence. This method allows the attackers to evade detection and conduct malicious activities over extended periods, with researchers finding evidence that the group has been using this approach for more than two years.

UAT-7237’s primary objective is to acquire access to its victims’ VPN and cloud infrastructure. The group employs a mix of open-source and custom-built tools to carry out its operations. Noteworthy among its arsenal is a bespoke shellcode loader named “SoundBill,” which is written in Chinese and can deploy payloads like Cobalt Strike for information-stealing operations. The attackers also use credential-harvesting tools like Mimikatz and privilege escalation tools such as JuicyPotato to move laterally within the compromised network.

Read

PAGERDUTY Confirms Data Breach After Salesforce Account Compromise

Thailand’s PDPA Crackdown 2025: Major Fines and Lessons from Latest Enforcement

While UAT-7237 is believed to be a subgroup of the larger Chinese-speaking APT UAT-5918, its distinct tactics and focus on web infrastructure suggest it is a separate and highly specialized cluster. The targeting of web hosting companies is particularly strategic as it provides a gateway to a multitude of clients, allowing the group to pivot from one compromised entity to others with relative ease. This latest report underscores the persistent and evolving cyber threat landscape in Taiwan, where state-backed hackers from China are increasingly seen as a primary source of attacks for both intelligence gathering and potential disruption of services.

Previous Post

Ransomware, Data Theft Strike Telecoms in UK and Australia, Raising Concerns for Critical Infrastructure

Next Post

CISA Releases Four Industrial Control Systems Advisories

Jane Doe

Jane Doe

More Articles

UN Creates Two Mechanisms for Global Governance of AI
Others

UN Creates Two Mechanisms for Global Governance of AI

The United Nations (UN) has taken a significant step toward establishing a global framework for artificial intelligence, announcing the creation...

by Jane Doe
September 3, 2025
OpenAI Plans India Data Center for $500 Billion ‘Stargate’ Project
Others

OpenAI Plans India Data Center for $500 Billion ‘Stargate’ Project

In a move set to solidify India's position in the global AI landscape, sources familiar with the matter have revealed...

by Jane Doe
September 1, 2025
AI Evolution Outpaces Regulation According to New Omdia Report
Others

AI Evolution Outpaces Regulation According to New Omdia Report

A new report from Omdia, a leading technology research and advisory firm, reveals a significant and growing gap between the...

by Jane Doe
August 28, 2025
Meta’s Aggressive Recruitment Sparks AI Talent War with Pay Packages Over $100 Million
Others

Saudi Arabia Overhauls School Curricula with AI, Cybersecurity, Tourism Subjects for New Academic Year

In a major educational reform aligned with Saudi Vision 2030, the Kingdom has introduced a comprehensive overhaul of its school...

by Jane Doe
August 23, 2025
Next Post
Nvidia Working on New AI Chip for China That Outperforms the H20

CISA Releases Four Industrial Control Systems Advisories

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Researchers Cracked the Encryption Used by DarkBit Ransomware

August 12, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

High-severity WinRAR 0-day exploited for weeks by 2 groups

August 12, 2025

Transforming App Development with AI, Part 3: Challenges and Ethical Considerations

March 19, 2025
Exploring AI’s Critical Role in Climate Change at the G7 Summit

Exploring AI’s Critical Role in Climate Change at the G7 Summit

May 28, 2025
Are We Ready for the Next Cyber Storm? Why Staying Passive Is the Greatest Risk

Are We Ready for the Next Cyber Storm?

April 26, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Ghanaian Nationals Extradited for Roles in $100M Romance and Wire Fraud

August 12, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.