• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Others

Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets

Jane Doe by Jane Doe
August 19, 2025
in Others
Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets
Share on FacebookShare on Twitter

A newly identified Chinese Advanced Persistent Threat (APT) group is systematically targeting web hosting firms in Taiwan, seeking to establish a long-term foothold for espionage and data theft. According to a recent report from Cisco Talos, the threat actor, tracked as UAT-7237, has successfully compromised at least one Taiwanese web hosting provider, demonstrating a clear focus on gaining access to high-value targets.

The attacks, which are part of a broader escalation of cyber intrusions against critical infrastructure in Taiwan, exploit known vulnerabilities on unpatched, internet-facing servers to gain initial access. Once inside the network, UAT-7237 deviates from the tactics of related Chinese groups by leveraging legitimate software, such as the SoftEther VPN client, to maintain a persistent presence. This method allows the attackers to evade detection and conduct malicious activities over extended periods, with researchers finding evidence that the group has been using this approach for more than two years.

UAT-7237’s primary objective is to acquire access to its victims’ VPN and cloud infrastructure. The group employs a mix of open-source and custom-built tools to carry out its operations. Noteworthy among its arsenal is a bespoke shellcode loader named “SoundBill,” which is written in Chinese and can deploy payloads like Cobalt Strike for information-stealing operations. The attackers also use credential-harvesting tools like Mimikatz and privilege escalation tools such as JuicyPotato to move laterally within the compromised network.

Read

App Store Power and Censorship: How Apple and Google Shape Your Digital Future

Google Sets Sights on Defying Gravity with Antigravity Project

While UAT-7237 is believed to be a subgroup of the larger Chinese-speaking APT UAT-5918, its distinct tactics and focus on web infrastructure suggest it is a separate and highly specialized cluster. The targeting of web hosting companies is particularly strategic as it provides a gateway to a multitude of clients, allowing the group to pivot from one compromised entity to others with relative ease. This latest report underscores the persistent and evolving cyber threat landscape in Taiwan, where state-backed hackers from China are increasingly seen as a primary source of attacks for both intelligence gathering and potential disruption of services.

Previous Post

Ransomware, Data Theft Strike Telecoms in UK and Australia, Raising Concerns for Critical Infrastructure

Next Post

CISA Releases Four Industrial Control Systems Advisories

Jane Doe

Jane Doe

More Articles

Palo Alto Networks Ushers In Autonomous AI Workforce for Cloud Security with Cortex Cloud 2.0
Others

Palo Alto Networks Ushers In Autonomous AI Workforce for Cloud Security with Cortex Cloud 2.0

Palo Alto Networks has officially ushered in the next era of cloud security with the launch of Cortex Cloud 2.0,...

by Jane Doe
October 28, 2025
UN Creates Two Mechanisms for Global Governance of AI
Others

UN Creates Two Mechanisms for Global Governance of AI

The United Nations (UN) has taken a significant step toward establishing a global framework for artificial intelligence, announcing the creation...

by Jane Doe
September 3, 2025
OpenAI Plans India Data Center for 0 Billion ‘Stargate’ Project
Others

OpenAI Plans India Data Center for $500 Billion ‘Stargate’ Project

In a move set to solidify India's position in the global AI landscape, sources familiar with the matter have revealed...

by Jane Doe
September 1, 2025
AI Evolution Outpaces Regulation According to New Omdia Report
Others

AI Evolution Outpaces Regulation According to New Omdia Report

A new report from Omdia, a leading technology research and advisory firm, reveals a significant and growing gap between the...

by Jane Doe
August 28, 2025
Next Post
CISA Releases Four Industrial Control Systems Advisories

CISA Releases Four Industrial Control Systems Advisories

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

App Store Power and Censorship: How Apple and Google Shape Your Digital Future

App Store Power and Censorship: How Apple and Google Shape Your Digital Future

November 19, 2025
Google Strikes Back at Chinese Smishing Ring

Google Strikes Back at Chinese Smishing Ring

November 16, 2025
MMaDA-Parallel: Advanced Multimodal Model Revolutionizing Content Generation

MMaDA-Parallel: Advanced Multimodal Model Revolutionizing Content Generation

November 19, 2025
European Union Introduces New Regulations Changing Data Privacy Landscape

European Union Introduces New Regulations Changing Data Privacy Landscape

November 19, 2025
Cloudflare Outage on November 18, 2025: A Deep Dive by Sumtrix

Cloudflare Outage on November 18, 2025: A Deep Dive by Sumtrix

November 19, 2025
FBI Sounds Alarm on Akira Ransomware’s 0 Million Haul

FBI Sounds Alarm on Akira Ransomware’s $250 Million Haul

November 16, 2025
Amazon’s Ambitious Push for AI Development in Australian Markets

Amazon’s Ambitious Push for AI Development in Australian Markets

June 17, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.