By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure
Computing

China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure

News Room
Last updated: 2026/01/16 at 4:01 AM
News Room Published 16 January 2026
Share
China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure
SHARE

Jan 16, 2026Ravie LakshmananZero-Day / Cyber Espionage

A threat actor likely aligned with China has been observed targeting critical infrastructure sectors in North America since at least last year.

Cisco Talos, which is tracking the activity under the name UAT-8837, assessed it to be a China-nexus advanced persistent threat (APT) actor with medium confidence based on tactical overlaps with other campaigns mounted by threat actors from the region.

The cybersecurity company noted that the threat actor is “primarily tasked with obtaining initial access to high-value organizations,” based on the tactics, techniques, and procedures (TTPs) and post-compromise activity observed.

“After obtaining initial access — either by successful exploitation of vulnerable servers or by using compromised credentials — UAT-8837 predominantly deploys open-source tools to harvest sensitive information such as credentials, security configurations, and domain and Active Directory (AD) information to create multiple channels of access to their victims,” it added.

UAT-8837 is said to have most recently exploited a critical zero-day vulnerability in Sitecore (CVE-2025-53690, CVSS score: 9.0) to obtain initial access, with the intrusion sharing TTP, tooling, and infrastructure similarities with a campaign detailed by Google-owned Mandiant in September 2025.

Cybersecurity

While it’s not clear if these two clusters are the work of the same actor, it suggests that UAT-8837 may have access to zero-day exploits to conduct cyber attacks.

Once the adversary obtains a foothold in target networks, it conducts preliminary reconnaissance, followed by disabling RestrictedAdmin for Remote Desktop Protocol (RDP), a security feature that ensures credentials and other user resources aren’t exposed to compromised remote hosts.

UAT-8837 is also said to open “cmd.exe” to conduct hands-on keyboard activity on the infected host and download several artifacts to enable post-exploitation. Some of the notable artifacts include –

  • GoTokenTheft, to steal access tokens
  • EarthWorm, to create a reverse tunnel to attacker-controlled servers using SOCKS
  • DWAgent, to enable persistent remote access and Active Directory reconnaissance
  • SharpHound, to collect Active Directory information
  • Impacket, to run commands with elevated privileges
  • GoExec, a Golang-based tool to execute commands on other connected remote endpoints within the victim’s network
  • Rubeus, a C# based toolset for Kerberos interaction and abuse
  • Certipy, a tool for Active Directory discovery and abuse

“UAT-8837 may run a series of commands during the intrusion to obtain sensitive information, such as credentials from victim organizations,” researchers Asheer Malhotra, Vitor Ventura, and Brandon White said.

“In one victim organization, UAT-8837 exfiltrated DLL-based shared libraries related to the victim’s products, raising the possibility that these libraries may be trojanized in the future. This creates opportunities for supply chain compromises and reverse engineering to find vulnerabilities in those products.”

The disclosure comes a week after Talos attributed another China-nexus threat actor known as UAT-7290 to espionage-focused intrusions against entities in South Asia and Southeastern Europe using malware families such as RushDrop, DriveSwitch, and SilentRaid.

Cybersecurity

In recent years, concerns about Chinese threat actors targeting critical infrastructure have prompted Western governments to issue several alerts. Earlier this week, cybersecurity and intelligence agencies from Australia, Germany, the Netherlands, New Zealand, the U.K., and the U.S. warned about the growing threats to operational technology (OT) environments.

The guidance offers a framework to design, secure, and manage connectivity in OT systems, urging organizations to limit exposure, centralize and standardize network connections, use secure protocols, harden OT boundary, ensure all connectivity is monitored and logged, and avoid using obsolete assets that could heighten the risk of security incidents.

“Exposed and insecure OT connectivity is known to be targeted by both opportunistic and highly capable actors,” the agencies said. “This activity includes state-sponsored actors actively targeting critical national infrastructure (CNI) networks. The threat is not just limited to state-sponsored actors with recent incidents showing how exposed OT infrastructure is opportunistically targeted by hacktivists.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article OnePlus Watch Lite Review: A surprising amount to like OnePlus Watch Lite Review: A surprising amount to like
Next Article This DIY Raspberry Pi Project Turns A Lego Set Into A Functional Game Boy – BGR This DIY Raspberry Pi Project Turns A Lego Set Into A Functional Game Boy – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Stunning discovery of seven mummified cheetahs in cave mystery revealed
Stunning discovery of seven mummified cheetahs in cave mystery revealed
News
Roku’s bringing 50 new free streaming channels to Fire TV
Roku’s bringing 50 new free streaming channels to Fire TV
Gadget
Warehouse automation startup Mytra snags 0M in funding –  News
Warehouse automation startup Mytra snags $120M in funding – News
News
Your Digital Footprint Can Lead Right to Your Front Door
Your Digital Footprint Can Lead Right to Your Front Door
Computing

You Might also Like

Your Digital Footprint Can Lead Right to Your Front Door
Computing

Your Digital Footprint Can Lead Right to Your Front Door

4 Min Read
Intel Releases Updated LLM-Scaler-vLLM With Continuing To Expand Its LLM Support
Computing

Intel Releases Updated LLM-Scaler-vLLM With Continuing To Expand Its LLM Support

2 Min Read
China carmakers to be dominant globally despite tariffs: AlixPartnersTechNode
Computing

China carmakers to be dominant globally despite tariffs: AlixPartnersTechNode

5 Min Read
Safaricom appoints new fixed broadband director
Computing

Safaricom appoints new fixed broadband director

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?