UAT-8837: China-linked uses Sitecore zero-day to target CNI.

  • Cisco Talos links a China-aligned actor, tracked as UAT-8837, to intrusions against North American critical infrastructure.
  • The actor exploited a critical zero-day in Sitecore (CVE-2025-53690, CVSS 9.0) to gain initial access.
  • After compromise, the actor uses open-source tools to harvest credentials and AD data and to establish persistent access.

Cisco Talos researchers reported that a China-nexus advanced persistent threat tracked as UAT-8837 has targeted critical infrastructure in North America since at least last year, aiming to gain access to high-value organizations, as detailed in their blog post (reported). The group most recently exploited a critical zero-day in Sitecore (CVE-2025-53690, CVSS 9.0) to obtain initial access.

- Advertisement -

Talos assessed with medium confidence that the actor aligns with China-based threat clusters and concluded the intrusions show similar tactics and infrastructure to prior campaigns (read more). "After obtaining initial access — either by successful exploitation of vulnerable servers or by using compromised credentials — UAT-8837 predominantly deploys open-source tools to harvest sensitive information such as credentials, security configurations, and domain and Active Directory (AD) information to create multiple channels of access to their victims."

Once inside, the group disables RestrictedAdmin for Remote Desktop Protocol, a Microsoft security feature (Remote Credential Guard), and runs interactive commands via cmd.exe. Observed tools and utilities downloaded by the actor include GoTokenTheft, EarthWorm, DWAgent, SharpHound, Impacket, GoExec, Rubeus, and Certipy.

Researchers noted targeted commands to extract credentials and environment data. "UAT-8837 may run a series of commands during the intrusion to obtain sensitive information, such as credentials from victim organizations," they said. "In one victim organization, UAT-8837 exfiltrated DLL-based shared libraries related to the victim’s products, raising the possibility that these libraries may be trojanized in the future. This creates opportunities for supply chain compromises and reverse engineering to find vulnerabilities in those products."

The disclosure follows other Talos reports and comes as multiple national agencies, coordinated through guidance from CISA and partners, warned about threats to operational technology and exposed OT connectivity (see notice).

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Waymo Targets 1M Weekly Paid Rides by 2026

Waymo, owned by Alphabet, aims to surpass one million paid rides per week by...

Microsoft: Firms Use AI Buttons to Poison Chatbot Memories

A disturbing new digital manipulation tactic has been uncovered by Microsoft security researchers, who...

Aave Lab Offers Revenue, New Focus to DAO’s End Feud

Aave Labs has proposed a new framework directing all revenue from Aave-branded products to...

Soldier used military secrets for $150K crypto bets.

An Israeli reserve soldier and a civilian accomplice face charges for allegedly using military...

BitGo, 21Shares Expand ETF Staking & Custody Partnership

BitGo and 21Shares have expanded their partnership to provide custody, trading, and staking services...

Must Read

Top 7 BEST Crypto Trading Bots for Beginners

QUICK NAVIGATIONQuick Look: Top 3 Best Crypto Trading BotsWhat Exactly is a Crypto Trading Bot?How I Chose These Trading BotsTop 7 Crypto Trading Bots...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!