New China-Linked Hacker Campaign Exploits Edge Devices in Telco Breaches

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

New China-Linked Hacker Campaign Exploits Edge Devices in Telco Breaches outlines activity by a sophisticated threat actor tracked by Cisco Talos as UAT-7290 with strong China nexus indicators that has been breaching telecommunications providers, including in Southeastern Europe, by exploiting public-facing edge network devices. The group performs extensive reconnaissance and uses one-day exploits and target-specific SSH brute force to gain initial access. Once inside, the attackers deploy a Linux-based malware suite (including RushDrop/ChronosRAT, DriveSwitch, SilentRaid/MystRodX, and Bulbature) and occasionally Windows implants like RedLeaves and ShadowPad. These tools establish persistent access and convert compromised devices into Operational Relay Boxes (ORBs) for further operations and potential use by other China-aligned actors in cyber-espionage. Talos published indicators of compromise to aid defenders. 

Who is affected

Telecommunications providers in South Asia and Southeastern Europe have seen direct compromise of edge devices, with broader indirect risk for service availability and regional infrastructure. 

Why CISOs should care

Compromise of telco edge devices can serve as infrastructure for broader supply chain intrusion and persistent espionage, jeopardizing customer data, service continuity, and trust in telecommunications infrastructure. 

3 practical actions

  • Harden publicly exposed devices: Apply vendor patches and restrict SSH access to telco edge infrastructure.
  • Monitor for abnormal lateral movement: Use network detection to identify ORB-like activity and unauthorized shell access.
  • Share and ingest IOCs: Integrate Talos-provided indicators of compromise into detection tooling to catch UAT-7290 activity.