UAT-8837: China-linked uses Sitecore zero-day to target CNI.

  • Cisco Talos links a China-aligned actor, tracked as UAT-8837, to intrusions against North American critical infrastructure.
  • The actor exploited a critical zero-day in Sitecore (CVE-2025-53690, CVSS 9.0) to gain initial access.
  • After compromise, the actor uses open-source tools to harvest credentials and AD data and to establish persistent access.

Cisco Talos researchers reported that a China-nexus advanced persistent threat tracked as UAT-8837 has targeted critical infrastructure in North America since at least last year, aiming to gain access to high-value organizations, as detailed in their blog post (reported). The group most recently exploited a critical zero-day in Sitecore (CVE-2025-53690, CVSS 9.0) to obtain initial access.

- Advertisement -

Talos assessed with medium confidence that the actor aligns with China-based threat clusters and concluded the intrusions show similar tactics and infrastructure to prior campaigns (read more). "After obtaining initial access — either by successful exploitation of vulnerable servers or by using compromised credentials — UAT-8837 predominantly deploys open-source tools to harvest sensitive information such as credentials, security configurations, and domain and Active Directory (AD) information to create multiple channels of access to their victims."

Once inside, the group disables RestrictedAdmin for Remote Desktop Protocol, a Microsoft security feature (Remote Credential Guard), and runs interactive commands via cmd.exe. Observed tools and utilities downloaded by the actor include GoTokenTheft, EarthWorm, DWAgent, SharpHound, Impacket, GoExec, Rubeus, and Certipy.

Researchers noted targeted commands to extract credentials and environment data. "UAT-8837 may run a series of commands during the intrusion to obtain sensitive information, such as credentials from victim organizations," they said. "In one victim organization, UAT-8837 exfiltrated DLL-based shared libraries related to the victim’s products, raising the possibility that these libraries may be trojanized in the future. This creates opportunities for supply chain compromises and reverse engineering to find vulnerabilities in those products."

The disclosure follows other Talos reports and comes as multiple national agencies, coordinated through guidance from CISA and partners, warned about threats to operational technology and exposed OT connectivity (see notice).

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Coinbase Resists Nevada Attempt to Block Prediction Markets

Coinbase shares remained resilient near recent highs despite Nevada regulators seeking an emergency court...

ARK Sells $22M Coinbase, Buys Bullish

Ark Invest sold another $22 million worth of Coinbase shares on Friday, continuing a...

Bitcoin Below $70K Spurs Investor Split, Institutions Buy

Bitwise CEO Hunter Horsley notes a divergence in market sentiment, with long-time holders feeling...

SHIB Slumps Amid Market Woes Sell or Hold

Shiba Inu has struggled through 2025 and into 2026 amid a broad market downturn...

Bullish CEO Forecasts Major Crypto Industry Consolidation

According to Bullish CEO Tom Farley, the crypto sector is poised for significant consolidation,...

Must Read

What Is the Dencun Upgrade for Ethereum?

The Dencun Upgrade for Ethereum is poised to revolutionize the blockchain landscape, offering improved scalability, efficiency, and groundbreaking features. Set to launch at the...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!