Chinese State-Sponsored Actors Target Global Critical Infrastructure
Summary
Hide ▲
Show ▼
Chinese state-sponsored APT actors have **dramatically escalated cyber operations against Taiwan and expanded into Southeast Asia**, with Taiwan’s National Security Bureau (NSB) reporting **960,620,609 intrusion attempts** in 2025—a **6% year-over-year increase** and **112.5% surge since 2023**. The **energy sector** faced a **tenfold spike in attacks**, while **emergency/hospital systems** saw a **54% rise**, including **ransomware deployments** disrupting operations in at least **20 hospitals** and stolen medical data sold on dark web forums. In **February 2026**, Singapore’s Cyber Security Agency (CSA) confirmed that **UNC3886**—a China-nexus APT group—executed a **deliberate cyber espionage campaign** against all four of Singapore’s major telecommunications operators (**M1, SIMBA Telecom, Singtel, StarHub**). The actors **weaponized a zero-day exploit** to bypass perimeter defenses, deployed **rootkits for persistence**, and exfiltrated technical data, though no personal customer data was compromised. Singapore’s **Operation CYBER GUARDIAN** successfully disrupted UNC3886’s access, engaged **over 100 investigators from six agencies**, and expanded monitoring to **banking, transport, and healthcare sectors** to prevent lateral movement. This campaign underscores the PRC’s **growing focus on Southeast Asian critical infrastructure** alongside its long-standing operations in Taiwan and North America. The campaigns, attributed to **BlackTech, Flax Typhoon, Mustang Panda, APT41, and UNC3886**, leverage **hardware/software vulnerabilities, DDoS, social engineering, and supply-chain compromises**, often correlating with **PLA military drills, political events, and visits by Taiwanese officials**. Taiwan’s NSB is now collaborating with **30+ countries** on joint investigations, while advisories from **CISA, NSA, and allies** warn of a shift from espionage to **potential disruptive capabilities**. Earlier phases targeted **U.S. government agencies (CBO, Treasury, CFIUS)**, **European telecoms**, and global critical infrastructure via exploits in **Cisco, Ivanti, Palo Alto, and Citrix devices**.
Timeline
-
09.02.2026 19:01 2 articles · 5h ago
UNC3886 Targets Singapore’s Telecom Sector with Zero-Day Exploits
In February 2026, Singapore’s Cyber Security Agency (CSA) revealed that the China-nexus APT group **UNC3886** conducted a **targeted cyber espionage campaign** against all four of Singapore’s major telecommunications operators: **M1, SIMBA Telecom, Singtel, and StarHub**. The threat actors **weaponized a zero-day exploit** to bypass a perimeter firewall and exfiltrate a small amount of technical data, while deploying **rootkits** to establish persistent access and evade detection. No personal customer data or internet services were disrupted. The CSA executed a **counter-operation named CYBER GUARDIAN**, closing off UNC3886’s access points and expanding monitoring capabilities across the targeted telcos. This response involved **over 100 investigators from six government agencies** and extended monitoring to **banking, transport, and healthcare sectors** to prevent lateral movement. Singapore’s Minister for Digital Development and Information, **Josephine Teo**, emphasized that the **limited impact** of the attack reflects the effectiveness of proactive defenses rather than a reduction in threat. UNC3886’s campaign aligns with its broader pattern of exploiting **edge devices and virtualization technologies** (e.g., VMware ESXi, vCenter) for long-term espionage, as previously documented under the alias **Fire Ant**. The group has historically leveraged zero-days in **FortiGate firewalls (CVE-2022-41328), VMware ESXi (CVE-2023-20867), and VMware vCenter Server (CVE-2023-34048)**.
Show sources
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
07.01.2026 00:27 2 articles · 1mo ago
Taiwan Reports Tenfold Surge in China-Linked Energy Sector Attacks
Taiwan’s National Security Bureau (NSB) documented **960,620,609 cyber intrusion attempts** targeting critical infrastructure in 2025—a **6% year-over-year increase** and **112.5% surge since 2023**—with the **energy sector facing a tenfold spike** in attacks. The **emergency/hospital sector** saw a **54% rise**, including **ransomware deployments** that disrupted operations in **at least 20 hospitals** and led to stolen medical data being sold on dark web forums. The NSB attributed the campaigns to **BlackTech, Flax Typhoon, Mustang Panda, APT41, and UNC3886**, which exploited **hardware/software vulnerabilities, DDoS, social engineering, and supply-chain attacks**, often in combination. Attacks correlated with **PLA joint combat readiness patrols**, **Taiwanese political events**, and **overseas visits by officials**, peaking in **May 2025** during the first anniversary of President Lai Ching-te’s inauguration. The report highlights **probing of industrial control systems (ICS)** and **telecom network equipment**, reinforcing patterns of **long-term access for potential disruption**.
Show sources
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
19.11.2025 12:20 3 articles · 2mo ago
China-Linked Operation "WrtHug" Hijacks ASUS Routers for Espionage
Operation **"WrtHug"** has compromised **roughly 50,000 ASUS WRT routers** worldwide—predominantly in **Taiwan (50%+ of victims), Southeast Asia, Russia, Central Europe, and the U.S.**—with **no infections observed in China**, potentially indicating a China-nexus actor. The campaign exploits **seven vulnerabilities** (including **CVE-2023-39780**, **CVE-2025-2492**) in **end-of-life SOHO devices**, leveraging the **ASUS AiCloud service** to deploy **persistent SSH backdoors** that survive reboots. A **shared 100-year TLS certificate** (replacing ASUS’s standard 10-year certificate) was used as a unique IoC to track infections, with **seven IPs overlapping** with the prior *AyySSHush* botnet. SecurityScorecard assesses **low-to-moderate confidence** in Chinese APT attribution, citing tactical overlaps with **Operational Relay Box (ORB) campaigns** (*LapDogs*, *PolarEdge*). Targeted models include **4G-AC55U, GT-AC5300, RT-AC1300UHP**, and others. ASUS has released **security updates** addressing all exploited flaws, but **unpatched or unsupported devices remain vulnerable** to takeover by other actors.
Show sources
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
07.11.2025 02:22 1 articles · 3mo ago
Chinese APT Group Breaches U.S. Congressional Budget Office
The U.S. Congressional Budget Office (CBO) confirmed a cybersecurity incident after a suspected foreign hacker—potentially linked to Chinese state-sponsored APT groups—breached its network. The intrusion, detected in early November 2025, may have exposed sensitive emails, draft reports, and internal communications between CBO analysts and congressional offices. The CBO contained the incident and deployed additional monitoring and security controls. This breach follows a pattern of targeted attacks on U.S. government agencies, including the **U.S. Treasury Department and CFIUS** in late 2024, both attributed to the Chinese APT group **Silk Typhoon**. The CBO, a nonpartisan agency providing economic analysis to Congress, represents a critical target for espionage or influence operations. The incident underscores the expanding scope of Chinese APT campaigns beyond traditional critical infrastructure to include legislative and economic policy institutions.
Show sources
- U.S. Congressional Budget Office hit by suspected foreign cyberattack — www.bleepingcomputer.com — 07.11.2025 02:22
-
20.10.2025 15:15 1 articles · 3mo ago
Salt Typhoon Exploits Citrix NetScaler Gateway Vulnerability in Global Cyber-Attack
Salt Typhoon has exploited a Citrix NetScaler Gateway vulnerability in a recent cyber intrusion. The group has used DLL sideloading and zero-day exploits to infiltrate systems. The intrusion involved a European telecommunications organization, beginning in July 2025. The attackers deployed a backdoor identified as SNAPPYBEE (also known as Deed RAT) through DLL sideloading. The backdoor established communication with command-and-control (C2) servers using HTTP and unidentified TCP-based protocols. The C2 domain aar.gandhibludtric[.]com was previously associated with Salt Typhoon infrastructure.
Show sources
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
24.09.2025 04:00 2 articles · 4mo ago
RedNovember Targets Global Infrastructure Using Public Exploits
RedNovember has targeted perimeter appliances of high-profile organizations globally, including defense and aerospace organizations, space organizations, and law firms. The group has breached at least two U.S. defense contractors, a European engine manufacturer, and a trade-focused intergovernmental cooperation body in Southeast Asia. RedNovember has used the Go-based backdoor Pantegana and Cobalt Strike as part of its intrusions, along with the Spark RAT and LESLIELOADER. The group has also used VPN services like ExpressVPN and Warp VPN to administer and connect to servers used for exploitation and communication.
Show sources
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
07.09.2025 17:09 3 articles · 5mo ago
Czech Republic's NUKIB Issues High Risk Warning on Chinese Technology
The Czech Republic's National Cyber and Information Security Agency (NUKIB) has issued a warning instructing critical infrastructure organizations to avoid using Chinese technology or transferring user data to servers located in China. The agency has re-evaluated its risk estimate of significant disruptions caused by China, now assessing it at a 'High' level. The NUKIB has confirmed malicious activities of Chinese cyber-actors targeting the Czech Republic, including a recent APT31 campaign targeting the Czech Ministry of Foreign Affairs. The warning includes consumer devices such as smartphones, IP cameras, electric cars, large language models, medical devices, and photovoltaic converters manufactured by Chinese firms as risky devices. All entities subject to the Czech Cybersecurity Act must adopt security measures to mitigate risks associated with Chinese technology.
Show sources
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
04.09.2025 23:04 3 articles · 5mo ago
Czech Republic Issues Advisory on PRC Data Theft
The Czech Republic's National Cyber and Information Security Agency (NUKIB) issued an advisory warning about data transfers to the People's Republic of China (PRC). The advisory highlights concerns over the transfer of system and user data to China, potentially misused by state, military, or political interests. The Czech government previously accused China of targeting its critical infrastructure through APT 31, an allegation denied by the PRC but condemned by the US, EU, and NATO. The advisory suggests that individuals and organizations consider restricting or prohibiting the use of products and services that transfer data to China.
Show sources
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
28.08.2025 17:04 4 articles · 5mo ago
Salt Typhoon Exploits Edge Devices to Breach 600 Organizations
The Salt Typhoon group has targeted at least 600 organizations across 80 countries, including 200 in the U.S. The actors have exploited vulnerabilities in Cisco, Ivanti, and Palo Alto Networks devices to gain initial access and have modified routers to maintain persistent access and pivot into other networks. The compromised devices are used to capture TACACS+ traffic for lateral movement and deeper network infiltration. The actors have enabled sshd_operns service on Cisco IOS XR devices to gain root access. The campaign is supported by an ecosystem of contractors, academics, and facilitators aiding in tool development and intrusion operations. The group has also exploited a Citrix NetScaler Gateway vulnerability in a recent cyber intrusion.
Show sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
27.08.2025 15:00 10 articles · 5mo ago
Joint Advisory on Chinese State-Sponsored Actors Targeting Global Infrastructure
The advisory includes previously unknown insights into People's Republic of China (PRC) cyber operations, highlighting a critical shift from espionage to **potential disruptive capabilities**. It notes that APT actors may target devices such as Fortinet firewalls, Juniper firewalls, Microsoft Exchange, and others. **Update (2026-01-06):** Taiwan’s National Security Bureau (NSB) corroborates this trend, reporting a **tenfold increase in attacks on Taiwan’s energy sector** in 2025, with **BlackTech, Flax Typhoon, Mustang Panda, APT41, and UNC3886** exploiting hardware/software vulnerabilities, DDoS, social engineering, and supply-chain attacks. The NSB’s findings align with prior advisories from **CISA, NSA, and allies**, underscoring the PRC’s expanding focus on **industrial control systems** and **long-term access for potential sabotage**. **Update (2026-02-09):** Singapore’s Cyber Security Agency (CSA) disclosed that **UNC3886** launched a **targeted cyber espionage campaign** against all four of Singapore’s major telecommunications operators (**M1, SIMBA Telecom, Singtel, StarHub**), weaponizing a **zero-day exploit** to bypass perimeter defenses and deploying **rootkits** for persistence. The **CYBER GUARDIAN** operation successfully disrupted the actors’ access and expanded monitoring, reinforcing the advisory’s warnings about **China’s escalating focus on critical infrastructure**.
Show sources
- CISA and Partners Release Joint Advisory on Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage Systems — www.cisa.gov — 27.08.2025 15:00
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
Information Snippets
-
Chinese state-sponsored actors are exploiting vulnerabilities in routers used by telecommunications providers and other infrastructure operators.
First reported: 27.08.2025 15:004 sources, 7 articlesShow sources
- CISA and Partners Release Joint Advisory on Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage Systems — www.cisa.gov — 27.08.2025 15:00
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
-
These actors often take steps to evade detection and maintain persistent access across multiple sectors.
First reported: 27.08.2025 15:005 sources, 8 articlesShow sources
- CISA and Partners Release Joint Advisory on Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage Systems — www.cisa.gov — 27.08.2025 15:00
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
-
The advisory includes updated threat intelligence from investigations conducted through July 2025.
First reported: 27.08.2025 15:002 sources, 3 articlesShow sources
- CISA and Partners Release Joint Advisory on Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage Systems — www.cisa.gov — 27.08.2025 15:00
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The advisory reflects indicators from industry reporting on multiple Chinese state-sponsored threat groups.
First reported: 27.08.2025 15:002 sources, 3 articlesShow sources
- CISA and Partners Release Joint Advisory on Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage Systems — www.cisa.gov — 27.08.2025 15:00
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
Recommended mitigations include patching known exploited vulnerabilities, enabling centralized logging, and securing edge infrastructure.
First reported: 27.08.2025 15:002 sources, 2 articlesShow sources
- CISA and Partners Release Joint Advisory on Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage Systems — www.cisa.gov — 27.08.2025 15:00
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
-
Salt Typhoon has exploited vulnerabilities in Cisco, Ivanti, and Palo Alto Networks devices to gain initial access.
First reported: 28.08.2025 17:043 sources, 4 articlesShow sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The campaign has targeted at least 600 organizations across 80 countries, including 200 in the U.S.
First reported: 28.08.2025 17:043 sources, 3 articlesShow sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The threat actors have modified routers to maintain persistent access and pivot into other networks.
First reported: 28.08.2025 17:043 sources, 4 articlesShow sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
-
The compromised devices are used to capture TACACS+ traffic for lateral movement and deeper network infiltration.
First reported: 28.08.2025 17:042 sources, 2 articlesShow sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
-
The actors have enabled sshd_operns service on Cisco IOS XR devices to gain root access.
First reported: 28.08.2025 17:043 sources, 5 articlesShow sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The campaign is supported by an ecosystem of contractors, academics, and facilitators aiding in tool development and intrusion operations.
First reported: 28.08.2025 17:043 sources, 6 articlesShow sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
-
The threat actors have targeted telecommunications, government, transportation, lodging, and military infrastructure sectors.
First reported: 28.08.2025 17:044 sources, 7 articlesShow sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
-
The actors have leveraged compromised devices and trusted connections to pivot into other networks.
First reported: 28.08.2025 17:043 sources, 6 articlesShow sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
-
The actors have modified routers to maintain persistent, long-term access to networks.
First reported: 28.08.2025 17:043 sources, 6 articlesShow sources
- Salt Typhoon Exploits Flaws in Edge Network Devices to Breach 600 Organizations Worldwide — thehackernews.com — 28.08.2025 17:04
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
-
The advisory was co-signed by nations including Canada, Australia, New Zealand, the UK, Czech Republic, Finland, Germany, Italy, Japan, the Netherlands, Poland, and Spain.
First reported: 28.08.2025 23:102 sources, 3 articlesShow sources
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The advisory tracks this cluster of activity to multiple advanced persistent threats (APTs), though it partially overlaps with Salt Typhoon.
First reported: 28.08.2025 23:102 sources, 3 articlesShow sources
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The advisory includes previously unknown insights into People's Republic of China (PRC) cyber operations.
First reported: 28.08.2025 23:101 source, 2 articlesShow sources
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
-
The advisory notes that the APT actors may target other devices such as Fortinet firewalls, Juniper firewalls, Microsoft Exchange, Nokia routers and switches, Sierra Wireless devices, Sonicwall firewalls, etc.
First reported: 28.08.2025 23:102 sources, 3 articlesShow sources
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The advisory recommends monitoring network device configuration changes, virtualized containers, network services and tunnels, protocol patterns, logs, and firmware and software integrity.
First reported: 28.08.2025 23:102 sources, 2 articlesShow sources
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The advisory contains indicators of compromise.
First reported: 28.08.2025 23:102 sources, 2 articlesShow sources
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The advisory highlights a critical shift from Chinese state-sponsored activity from being purely espionage to something more invasive, aiming for long-term access for potential disruption.
First reported: 28.08.2025 23:104 sources, 6 articlesShow sources
- CISA, FBI, NSA Warn of Chinese 'Global Espionage System' — www.darkreading.com — 28.08.2025 23:10
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- U.S. Congressional Budget Office hit by suspected foreign cyberattack — www.bleepingcomputer.com — 07.11.2025 02:22
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
-
The Czech Republic's National Cyber and Information Security Agency (NÚKIB) issued an advisory warning about data transfers to the People's Republic of China (PRC).
First reported: 04.09.2025 23:043 sources, 3 articlesShow sources
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The advisory highlights concerns over the transfer of system and user data to China, potentially misused by state, military, or political interests.
First reported: 04.09.2025 23:043 sources, 3 articlesShow sources
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The Czech government previously accused China of targeting its critical infrastructure through APT 31, an allegation denied by the PRC but condemned by the US, EU, and NATO.
First reported: 04.09.2025 23:043 sources, 3 articlesShow sources
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
China has been conducting large-scale telco attacks across the US and the world, positioning itself for potential destructive cyberattacks.
First reported: 04.09.2025 23:043 sources, 4 articlesShow sources
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
- U.S. Congressional Budget Office hit by suspected foreign cyberattack — www.bleepingcomputer.com — 07.11.2025 02:22
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
-
CrowdStrike's reports indicate a significant increase in Chinese intrusion activity, with a 150% year-over-year increase and a 40% jump in cloud-targeting operations.
First reported: 04.09.2025 23:041 source, 1 articleShow sources
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
-
The Czech report emphasizes the legal regulations in China that allow government authorities to access data, highlighting the risks of using products and services that send data to China.
First reported: 04.09.2025 23:043 sources, 3 articlesShow sources
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The advisory suggests that individuals and organizations consider restricting or prohibiting the use of products and services that transfer data to China.
First reported: 04.09.2025 23:043 sources, 3 articlesShow sources
- Czech Warning Highlights China Stealing User Data — www.darkreading.com — 04.09.2025 23:04
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The Czech Republic's National Cyber and Information Security Agency (NUKIB) has re-evaluated its risk estimate of significant disruptions caused by China, now assessing it at a 'High' level.
First reported: 07.09.2025 17:092 sources, 2 articlesShow sources
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The NUKIB has confirmed malicious activities of Chinese cyber-actors targeting the Czech Republic, including a recent APT31 campaign targeting the Czech Ministry of Foreign Affairs.
First reported: 07.09.2025 17:092 sources, 2 articlesShow sources
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The Chinese government has access to data stored by private cloud service providers within the Czech Republic, ensuring that sensitive data is always within its reach.
First reported: 07.09.2025 17:092 sources, 2 articlesShow sources
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The NUKIB warning includes consumer devices such as smartphones, IP cameras, electric cars, large language models, medical devices, and photovoltaic converters manufactured by Chinese firms as risky devices.
First reported: 07.09.2025 17:092 sources, 2 articlesShow sources
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
All entities subject to the Czech Cybersecurity Act must adopt security measures to mitigate risks associated with Chinese technology.
First reported: 07.09.2025 17:092 sources, 2 articlesShow sources
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
The NUKIB's warning does not impose a ban on transferring data to the PRC or allowing remote administration from it, but organizations must include the threat in their risk analysis and decide on mitigation measures.
First reported: 07.09.2025 17:092 sources, 2 articlesShow sources
- Czech cyber agency warns against Chinese tech in critical infrastructure — www.bleepingcomputer.com — 07.09.2025 17:09
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember, an advanced persistent threat (APT) tied to Chinese state interests, exploits publicly available vulnerability exploits to infiltrate high-value corporations and government agencies.
First reported: 24.09.2025 04:002 sources, 2 articlesShow sources
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember targets Check Point security gateways, Palo Alto's GlobalProtect, SonicWall products, Cisco Adaptive Security Appliance, F5 Network's BIG-IP, Sophos SSL VPN, and Fortinet FortiGate instances, and Ivanti Connect Secure VPN appliances.
First reported: 24.09.2025 04:002 sources, 2 articlesShow sources
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember uses commercial tools such as LeslieLoader, SparkRAT, Pantegana, Cobalt Strike, and commercial VPNs like ExpressVPN.
First reported: 24.09.2025 04:002 sources, 2 articlesShow sources
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember's activities are aligned with Chinese state interests, targeting defense and aerospace organizations in the West, foreign affairs ministries in Asia, and other geopolitically significant entities.
First reported: 24.09.2025 04:002 sources, 2 articlesShow sources
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember conducted cyber reconnaissance on Panamanian organizations in finance, transportation, international relations, land and economic development, and emergency services following geopolitical shifts.
First reported: 24.09.2025 04:002 sources, 2 articlesShow sources
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember performed cyber reconnaissance on a location in Taiwan that is home to semiconductor research and development and a Taiwanese military airbase during a Chinese military exercise near Taiwan.
First reported: 24.09.2025 04:002 sources, 2 articlesShow sources
- Chinese APT Uses OSS & PoCs to Spy on Other Countries — www.darkreading.com — 24.09.2025 04:00
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember has targeted perimeter appliances of high-profile organizations globally, including defense and aerospace organizations, space organizations, and law firms.
First reported: 24.09.2025 19:361 source, 1 articleShow sources
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember has breached at least two U.S. defense contractors, a European engine manufacturer, and a trade-focused intergovernmental cooperation body in Southeast Asia.
First reported: 24.09.2025 19:361 source, 1 articleShow sources
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember has targeted a ministry of foreign affairs in central Asia, a state security organization in Africa, a European government directorate, and a Southeast Asian government.
First reported: 24.09.2025 19:361 source, 1 articleShow sources
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember has targeted Ivanti Connect Secure appliances associated with a newspaper and an engineering and military contractor, both based in the U.S.
First reported: 24.09.2025 19:361 source, 1 articleShow sources
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember has targeted the Microsoft Outlook Web Access (OWA) portals belonging to a South American country before that country's state visit to China.
First reported: 24.09.2025 19:361 source, 1 articleShow sources
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember has used the Go-based backdoor Pantegana and Cobalt Strike as part of its intrusions.
First reported: 24.09.2025 19:361 source, 1 articleShow sources
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember has used the Spark RAT and LESLIELOADER to launch its attacks.
First reported: 24.09.2025 19:361 source, 1 articleShow sources
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
RedNovember has used VPN services like ExpressVPN and Warp VPN to administer and connect to servers used for exploitation and communication.
First reported: 24.09.2025 19:361 source, 1 articleShow sources
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — thehackernews.com — 24.09.2025 19:36
-
Salt Typhoon has exploited a Citrix NetScaler Gateway vulnerability in a recent cyber intrusion.
First reported: 20.10.2025 15:151 source, 1 articleShow sources
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The group has used DLL sideloading and zero-day exploits to infiltrate systems.
First reported: 20.10.2025 15:152 sources, 2 articlesShow sources
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
-
The intrusion involved a European telecommunications organization, beginning in July 2025.
First reported: 20.10.2025 15:151 source, 1 articleShow sources
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The attackers deployed a backdoor identified as SNAPPYBEE (also known as Deed RAT) through DLL sideloading.
First reported: 20.10.2025 15:151 source, 1 articleShow sources
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The backdoor established communication with command-and-control (C2) servers using HTTP and unidentified TCP-based protocols.
First reported: 20.10.2025 15:151 source, 1 articleShow sources
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The C2 domain aar.gandhibludtric[.]com was previously associated with Salt Typhoon infrastructure.
First reported: 20.10.2025 15:151 source, 1 articleShow sources
- Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack — www.infosecurity-magazine.com — 20.10.2025 15:15
-
The U.S. Congressional Budget Office (CBO) suffered a cybersecurity incident attributed to a suspected foreign hacker, potentially exposing sensitive data including emails and internal communications.
First reported: 07.11.2025 02:221 source, 1 articleShow sources
- U.S. Congressional Budget Office hit by suspected foreign cyberattack — www.bleepingcomputer.com — 07.11.2025 02:22
-
The CBO confirmed the breach, contained it, and implemented additional monitoring and security controls to protect its systems.
First reported: 07.11.2025 02:221 source, 1 articleShow sources
- U.S. Congressional Budget Office hit by suspected foreign cyberattack — www.bleepingcomputer.com — 07.11.2025 02:22
-
The attack on the CBO is part of a broader pattern of cyber incidents targeting U.S. government agencies, following similar breaches at the U.S. Treasury Department and the Committee on Foreign Investment in the United States (CFIUS) in late 2024.
First reported: 07.11.2025 02:221 source, 1 articleShow sources
- U.S. Congressional Budget Office hit by suspected foreign cyberattack — www.bleepingcomputer.com — 07.11.2025 02:22
-
The breaches at the Treasury Department and CFIUS were attributed to the Chinese state-sponsored APT group Silk Typhoon, which exploited the third-party remote support platform BeyondTrust.
First reported: 07.11.2025 02:221 source, 1 articleShow sources
- U.S. Congressional Budget Office hit by suspected foreign cyberattack — www.bleepingcomputer.com — 07.11.2025 02:22
-
Operation "WrtHug" exploits six legacy ASUS router vulnerabilities (CVE-2023-41345, CVE-2023-41346, CVE-2023-41347, CVE-2023-41348, CVE-2024-12912, CVE-2025-2492) to hijack thousands of devices globally, with up to 50% of victims located in Taiwan.
First reported: 19.11.2025 12:203 sources, 3 articlesShow sources
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
The campaign uses a self-signed TLS certificate with a 100-year expiration date, shared across thousands of compromised ASUS WRT routers, to enable persistence and evade detection.
First reported: 19.11.2025 12:203 sources, 3 articlesShow sources
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
SecurityScorecard assesses with low-to-moderate confidence that Operation WrtHug is linked to Chinese APT actors, citing TTP overlaps with prior campaigns like "AyySSHush" and a focus on Taiwan as key indicators.
First reported: 19.11.2025 12:202 sources, 2 articlesShow sources
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
-
The operation targets end-of-life SOHO routers via ASUS AiCloud service and OS injection flaws, highlighting a strategic shift toward embedding espionage infrastructure in consumer-grade devices.
First reported: 19.11.2025 12:202 sources, 2 articlesShow sources
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
-
Seven IPs exhibited signs of compromise in both Operation WrtHug and the earlier China-linked "AyySSHush" campaign, suggesting potential collaboration or shared infrastructure between the actors.
First reported: 19.11.2025 12:203 sources, 3 articlesShow sources
- China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers — www.infosecurity-magazine.com — 19.11.2025 12:20
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
The campaign has compromised **tens of thousands** of ASUS WRT routers globally, with predominant infections in Taiwan, the U.S., and Russia, as well as Southeast Asia and Europe.
First reported: 19.11.2025 15:002 sources, 2 articlesShow sources
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
99% of the infected routers present a shared self-signed TLS certificate via the **ASUS AiCloud service**, which enables remote access to local storage.
First reported: 19.11.2025 15:002 sources, 2 articlesShow sources
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
The targeted ASUS router models include **4G-AC55U, 4G-AC860U, DSL-AC68U, GT-AC5300, GT-AX11000, RT-AC1200HP, RT-AC1300GPLUS, and RT-AC1300UHP**.
First reported: 19.11.2025 15:002 sources, 2 articlesShow sources
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
The actors chain **command injection and authentication bypass flaws** to deploy persistent SSH backdoors, ensuring survival across reboots or firmware updates.
First reported: 19.11.2025 15:002 sources, 2 articlesShow sources
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
The operation shares tactical similarities with China-linked **Operational Relay Box (ORB) campaigns** like *LapDogs* and *PolarEdge*, though it is not classified as a traditional ORB.
First reported: 19.11.2025 15:002 sources, 2 articlesShow sources
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide — thehackernews.com — 19.11.2025 15:00
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
The WrtHug campaign has compromised roughly **50,000 unique IPs** globally, with no observed infections within China, potentially indicating a threat actor from this country.
First reported: 19.11.2025 16:351 source, 1 articleShow sources
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
The campaign exploits **CVE-2023-39780**, a major command injection flaw also used in the **AyySSHush** campaign, alongside six other vulnerabilities.
First reported: 19.11.2025 16:351 source, 1 articleShow sources
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
The **100-year TLS certificate** (replacing ASUS’s standard 10-year certificate) was used as a unique IoC to identify the 50,000 infected IPs.
First reported: 19.11.2025 16:351 source, 1 articleShow sources
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
Compromised routers are **not updated with new firmware**, leaving them vulnerable to takeover by other threat actors.
First reported: 19.11.2025 16:351 source, 1 articleShow sources
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
ASUS has released **security updates** addressing all WrtHug-exploited vulnerabilities, urging users to upgrade firmware or replace unsupported devices.
First reported: 19.11.2025 16:351 source, 1 articleShow sources
- New WrtHug campaign hijacks thousands of end-of-life ASUS routers — www.bleepingcomputer.com — 19.11.2025 16:35
-
Taiwan's National Security Bureau (NSB) reports that China-linked cyberattacks on Taiwan's energy sector increased tenfold (1,000%) in 2025 compared to 2024, with coordinated spikes during military activities, political events, and senior official visits.
First reported: 07.01.2026 00:272 sources, 2 articlesShow sources
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
The NSB identified four primary attack methods: **hardware/software vulnerabilities** (most prevalent), **DDoS**, **social engineering**, and **supply-chain incidents**—with a focus on implanting malware during planned software upgrades in energy companies.
First reported: 07.01.2026 00:272 sources, 2 articlesShow sources
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
Chinese APT groups **BlackTech, Flax Typhoon, Mustang Panda, APT41, and UNC3886** were attributed to the attacks, targeting **industrial control systems** in petroleum, electricity, and natural gas sectors, as well as **adversary-in-the-middle (AitM) attacks** in communications and **phishing/data theft** in government agencies.
First reported: 07.01.2026 00:272 sources, 2 articlesShow sources
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
Taiwan’s overall China-linked cyber incidents grew by **6% year-over-year**, with **emergency/hospital sectors (+54%)** and **communications (+6.7%)** seeing notable increases, while finance and water resources saw reductions.
First reported: 07.01.2026 00:272 sources, 2 articlesShow sources
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
The NSB is collaborating with **over 30 countries** on intelligence sharing and joint investigations into China’s malicious cyber infrastructure, emphasizing Taiwan’s role in a broader coalition countering PRC threats.
First reported: 07.01.2026 00:272 sources, 2 articlesShow sources
- Taiwan says China's attacks on its energy sector increased tenfold — www.bleepingcomputer.com — 07.01.2026 00:27
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
Taiwan's National Security Bureau (NSB) recorded **960,620,609 cyber intrusion attempts** targeting critical infrastructure in 2025, averaging **2.63 million attempts per organization per day**.
First reported: 07.01.2026 16:001 source, 1 articleShow sources
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
The 2025 total represents a **6% increase from 2024** and a **112.5% increase compared to 2023**.
First reported: 07.01.2026 16:001 source, 1 articleShow sources
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
Chinese threat actors deployed **ransomware against major hospitals in Taiwan**, compromising operations in at least **20 confirmed cases**, and sold stolen medical data on dark web forums.
First reported: 07.01.2026 16:001 source, 1 articleShow sources
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
Cyber intrusion attempts peaked in **May 2025**, coinciding with the first anniversary of Taiwanese President Lai Ching-te's inauguration.
First reported: 07.01.2026 16:001 source, 1 articleShow sources
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
The NSB observed **correlation between Chinese cyber campaigns and PLA joint combat readiness patrols**, as well as Taiwan's major ceremonies, government statements, and overseas visits by high-level officials.
First reported: 07.01.2026 16:001 source, 1 articleShow sources
- China intensifies Cyber-Attacks on Taiwan as Energy Sector Sees Tenfold Spike — www.infosecurity-magazine.com — 07.01.2026 16:00
-
UNC3886 launched a deliberate, targeted cyber espionage campaign against all four of Singapore’s major telecommunications operators: M1, SIMBA Telecom, Singtel, and StarHub.
First reported: 09.02.2026 19:012 sources, 2 articlesShow sources
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
The threat actors weaponized a zero-day exploit to bypass a perimeter firewall and exfiltrate a small amount of technical data from one of Singapore’s telcos.
First reported: 09.02.2026 19:012 sources, 2 articlesShow sources
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
UNC3886 deployed rootkits to establish persistent access and conceal their activities within compromised telecom networks.
First reported: 09.02.2026 19:012 sources, 2 articlesShow sources
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
Singapore’s Cyber Security Agency (CSA) executed a counter-operation named **CYBER GUARDIAN** to disrupt UNC3886’s access and limit lateral movement in telecom networks.
First reported: 09.02.2026 19:012 sources, 2 articlesShow sources
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
Remediation measures have been implemented, including closing off UNC3886’s access points and expanding monitoring capabilities in the targeted telcos.
First reported: 09.02.2026 19:012 sources, 2 articlesShow sources
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
There is no evidence that UNC3886 exfiltrated personal customer data or disrupted internet services during the campaign.
First reported: 09.02.2026 19:012 sources, 2 articlesShow sources
- China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign — thehackernews.com — 09.02.2026 19:01
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
The Singaporean government engaged over 100 investigators from six agencies to respond to the UNC3886 campaign against telecom operators.
First reported: 10.02.2026 00:471 source, 1 articleShow sources
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
Singapore’s Minister for Digital Development and Information, Josephine Teo, emphasized that the limited impact of UNC3886’s attack underscores the effectiveness of proactive cyber defense measures, though it does not eliminate the broader threat.
First reported: 10.02.2026 00:471 source, 1 articleShow sources
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
The CSA and IMDA’s response included expanding monitoring to other critical infrastructure sectors (banking, transport, healthcare) to prevent lateral movement by UNC3886.
First reported: 10.02.2026 00:471 source, 1 articleShow sources
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
-
UNC3886’s historical exploits include zero-days in FortiGate firewalls (CVE-2022-41328), VMware ESXi (CVE-2023-20867), and VMware vCenter Server (CVE-2023-34048), aligning with their pattern of targeting virtualization and edge devices.
First reported: 10.02.2026 00:471 source, 1 articleShow sources
- Chinese cyberspies breach Singapore's four largest telcos — www.bleepingcomputer.com — 10.02.2026 00:47
Similar Happenings
Asian State-Backed Group TGR-STA-1030 Targets 70 Government and Infrastructure Entities
A previously undocumented cyber espionage group, TGR-STA-1030, has compromised at least 70 government and critical infrastructure organizations across 37 countries over the past year. The group, assessed to be of Asian origin, leverages phishing emails and exploits N-day vulnerabilities to deploy malware and maintain long-term access for espionage purposes. Targets include national law enforcement, ministries of finance, and departments related to economic, trade, natural resources, and diplomatic functions. The group uses a variety of tools, including Cobalt Strike, Behinder, Godzilla, and a Linux kernel rootkit named ShadowGuard. The group conducted reconnaissance activity targeting government entities connected to 155 countries between November and December 2025 and showed increased interest in scanning entities across North, Central, and South America during the U.S. government shutdown in October 2025. The group also exploited at least 15 known vulnerabilities in SAP Solution Manager, Microsoft Exchange Server, D-Link, and Microsoft Windows.
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
China-nexus threat actor UAT-7290 has been targeting telecommunications providers in South Asia and Southeastern Europe since at least 2022. The group conducts extensive reconnaissance before deploying malware families like RushDrop, DriveSwitch, SilentRaid, and Bulbature. UAT-7290 also establishes Operational Relay Box (ORB) nodes, which other China-nexus actors may use, indicating a dual role in espionage and initial access provision. The group uses a mix of open-source malware, custom tooling, and 1-day vulnerabilities in edge networking products. Recent activity shows overlaps with RedLeaves, ShadowPad, and RedFoxtrot, suggesting a broader China-linked operation.
Exploitation of Network Security Flaws by APT Actors
Multiple network security products, including those from Fortinet, SonicWall, Cisco, and WatchGuard, have been targeted by threat actors exploiting critical vulnerabilities. Cisco's AsyncOS flaw (CVE-2025-20393) is being exploited by a China-nexus APT group, UAT-9686, to deliver malware such as ReverseSSH and AquaPurge. SonicWall's SMA 100 series appliances are also being targeted through a combination of vulnerabilities to achieve unauthenticated remote code execution. These attacks highlight the increasing focus on network security products as entry points for deeper network infiltration.
Notepad++ Update Mechanism Exploited to Deliver Malicious Payloads
Notepad++ version 8.8.9 was released to address a security flaw in its WinGUp update tool that allowed attackers to push malicious executables instead of legitimate updates. Users reported incidents where the updater spawned a malicious AutoUpdater.exe that collected device information and exfiltrated it to a remote site. The flaw was mitigated by enforcing updates only from GitHub and later by requiring signature verification for all updates. Security researchers noted targeted attacks against organizations with interests in East Asia, where Notepad++ processes were used to gain initial access. The attack involved an infrastructure-level compromise at the hosting provider level, allowing malicious actors to intercept and redirect update traffic. The incident commenced in June 2025 and continued until December 2025, with the Notepad++ website later migrated to a new hosting provider. The attackers were likely Chinese state-sponsored threat actors, selectively redirecting update requests from certain users to malicious servers. The hosting provider for the update feature was compromised, enabling targeted traffic redirections. The attackers regained access using previously obtained internal service credentials. Notepad++ has since migrated all clients to a new hosting provider with stronger security and plans to enforce mandatory certificate signature verification in version 8.9.2. The compromise involved shared hosting infrastructure rather than a flaw in the software's code, with attackers gaining access at the hosting provider level to intercept and manipulate traffic bound for the Notepad++ update endpoint. Direct server access by the attackers ended on September 2, 2025, but credentials associated with internal services remained exposed until December 2, 2025, allowing continued traffic redirection. The hosting provider confirmed no additional customers were affected.
Storm-0249 Adopts Advanced Tactics for Ransomware Attacks
Storm-0249, previously known as an initial access broker, has escalated its operations by employing advanced tactics such as domain spoofing, DLL sideloading, and fileless PowerShell execution to facilitate ransomware attacks. These methods allow the threat actor to bypass defenses, infiltrate networks, maintain persistence, and operate undetected. The group has shifted from mass phishing campaigns to more precise attacks, leveraging the trust associated with signed processes for added stealth. The ultimate goal is to obtain persistent access to enterprise networks and monetize them by selling access to ransomware gangs.