By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
Computing

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

News Room
Last updated: 2026/01/09 at 10:58 PM
News Room Published 9 January 2026
Share
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
SHARE

Jan 08, 2026Ravie LakshmananMalware / Threat Intelligence

A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe.

The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the deployment of malware families such as RushDrop, DriveSwitch, and SilentRaid, according to a Cisco Talos report published today.

“In addition to conducting espionage-focused attacks where UAT-7290 burrows deep inside a victim enterprise’s network infrastructure, their tactics, techniques, and procedures (TTPs) and tooling suggest that this actor also establishes Operational Relay Box (ORBs) nodes,” researchers Asheer Malhotra, Vitor Ventura, and Brandon White said.

“The ORB infrastructure may then be used by other China-nexus actors in their malicious operations, signifying UAT-7290’s dual role as an espionage-motivated threat actor as well as an initial access group.”

Cybersecurity

Attacks mounted by the adversary have mainly targeted telecommunications providers in South Asia. However, recent intrusion waves have branched out to strike organizations in Southeastern Europe.

UAT-7290’s tradecraft is broad as it’s varied, relying on a combination of open-source malware, custom tooling, and payloads for one-day vulnerabilities in popular edge networking products. Some of the notable Windows implants put to use by the threat actor include RedLeaves (aka BUGJUICE) and ShadowPad, both exclusively linked to Chinese hacking groups.

That said, the group mainly leverages a Linux-based malware suite comprising –

  • RushDrop (aka ChronosRAT), a dropper that initiates the infection chain
  • DriveSwitch, a peripheral malware that’s used to execute SilentRaid on the infected system
  • SilentRaid (aka MystRodX), a C++-based implant that establishes persistent access to compromised endpoints and employs a plugin-like approach to communicate with an external server, open a remote shell, set up port forwarding, and perform file operations

It’s worth noting that a prior analysis from QiAnXin XLab flagged MystRodX as a variant of ChronosRAT, a modular ELF binary that’s capable of shellcode execution, file management, keylogging, port forwarding, remote shell, screenshot capture, and proxy. Palo Alto Networks Unit 42 is tracking the associated threat cluster under the moniker CL-STA-0969.

Cybersecurity

Also deployed by UAT-7290 is a backdoor called Bulbature that’s engineered to transform a compromised edge device into an ORBs. It was first documented by Sekoia in October 2024.

The cybersecurity company said the threat actor shares tactical and infrastructure overlaps with China-linked adversaries known as Stone Panda and RedFoxtrot (aka Nomad Panda).

“The threat actor conducts extensive reconnaissance of target organizations before carrying out intrusions. UAT-7290 leverages one-day exploits and target-specific SSH brute force to compromise public-facing edge devices to gain initial access and escalate privileges on compromised systems,” the researchers said. “The actor appears to rely on publicly available proof-of-concept exploit code as opposed to developing their own.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Level the Playing Field With This Deal: Take 31% Off Razer Viper V3 Pro Gaming Mouse Level the Playing Field With This Deal: Take 31% Off Razer Viper V3 Pro Gaming Mouse
Next Article Honor Magic 8 Pro review: a stunning zoom snapper, but left behind in other areas Honor Magic 8 Pro review: a stunning zoom snapper, but left behind in other areas
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Canonical Builds Steam Snap For Ubuntu ARM64 Leveraging FEX
Canonical Builds Steam Snap For Ubuntu ARM64 Leveraging FEX
Computing
How Machine Learning Models Are Leading the Change
How Machine Learning Models Are Leading the Change
Gadget
Microsoft Finally Allows You to Uninstall Copilot—but There Are Quite a Few Hoops
Microsoft Finally Allows You to Uninstall Copilot—but There Are Quite a Few Hoops
News
CES 2026: world’s first wheel-legged robot vacuum designed to tackle stairs and multi-level homes · TechNode
CES 2026: world’s first wheel-legged robot vacuum designed to tackle stairs and multi-level homes · TechNode
Computing

You Might also Like

Canonical Builds Steam Snap For Ubuntu ARM64 Leveraging FEX
Computing

Canonical Builds Steam Snap For Ubuntu ARM64 Leveraging FEX

2 Min Read
CES 2026: world’s first wheel-legged robot vacuum designed to tackle stairs and multi-level homes · TechNode
Computing

CES 2026: world’s first wheel-legged robot vacuum designed to tackle stairs and multi-level homes · TechNode

1 Min Read
Antimemetics: An Essential Field Guide | HackerNoon
Computing

Antimemetics: An Essential Field Guide | HackerNoon

23 Min Read
Microsoft debuts Copilot Checkout, joining AI shopping race vs. Amazon, Google and OpenAI
Computing

Microsoft debuts Copilot Checkout, joining AI shopping race vs. Amazon, Google and OpenAI

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?