Cisco Talos Blog: UAT-7237 targets Taiwanese web hosting infrastructure

Source URL: https://blog.talosintelligence.com/uat-7237-targets-web-hosting-infra/
Source: Cisco Talos Blog
Title: UAT-7237 targets Taiwanese web hosting infrastructure

Feedly Summary: Cisco Talos discovered UAT-7237, a Chinese-speaking advanced persistent threat (APT) group active since at least 2022, which has significant overlaps with UAT-5918.

AI Summary and Description: Yes

Summary: The text discusses the activities of UAT-7237, a Chinese-speaking advanced persistent threat (APT) group, and its sophisticated tactics in targeting web infrastructure entities in Taiwan. The report highlights the group’s reliance on customized, open-source tools for long-term persistence and malicious operations, including credential theft and VPN exploitation.

Detailed Description:
The text outlines the operational details and methodologies employed by UAT-7237, emphasizing its classification as an APT focused on web infrastructure. The analysis showcases the group’s reliance on both well-known and customized open-source tools for executing its attacks.

Key points include:

– **Identification of UAT-7237:**
– APT group that has been active since at least 2022.
– Related to another group, UAT-5918, showing significant operational overlaps.

– **Attack Methodologies:**
– **Initial Access:**
– Exploits known vulnerabilities on unpatched servers.
– Uses tools such as reconnaissance scripts (cmd commands) to assess the target.
– **Persistence Techniques:**
– Custom Shellcode loader named “SoundBill” allows for decoding and executing any shellcode, including Cobalt Strike beacons.
– Setups for remote access through SoftEther VPN and RDP (Remote Desktop Protocol).

– **Tools and TTPs:**
– Utilizes various open-source tools and custom malware such as:
– **SoundBill:** Shellcode loader for executing commands and deploying additional malware.
– **JuicyPotato:** For privilege escalation.
– Employs Windows Management Instrumentation (WMI) for remote execution and command execution.

– **Credential Theft and Exfiltration:**
– Uses tools like Mimikatz and customized versions to extract credentials and sensitive information from endpoints.
– Evidence of using multiple attachment methods to deploy malware for credential extraction.

– **Networking Techniques:**
– Conducts network scanning to identify other potentially vulnerable systems within the enterprise environment.

– **Security Recommendations:**
– Cisco security solutions proposed to mitigate threats from such APTs:
– Cisco Secure Endpoint, Secure Email, Secure Firewall, and Secure Access.
– Emphasizes the importance of multi-factor authentication and up-to-date protection against the identified tactics.

Overall, the analysis of UAT-7237 provides critical insights into the evolving tactics of APT groups, highlighting the need for improved defenses in web infrastructure against these sophisticated threats. The implications are significant for security and compliance professionals, who must be informed of such threats to enhance their defensive strategies and protect sensitive organizational data.