Cisco Talos Exposes UAT-8302: China APT Armed With Shared Malware
China-nexus APT group UAT-8302 targets South American and European governments using NetDraft, CloudSorcerer, and VShell backdoors. Cisco Talos reveals connections to multiple Chinese threat clusters.
Cisco Talos has disclosed UAT-8302, a China-nexus advanced persistent threat group that has been targeting government entities across South America since late 2024 and southeastern European agencies throughout 2025. The group deploys an arsenal of custom malware that overlaps with tools used by multiple other Chinese APT clusters—suggesting either shared development resources or deliberate tool sharing among Beijing-aligned operators.
Talos assesses with high confidence that UAT-8302 focuses on obtaining and maintaining long-term access to government networks for espionage purposes. The campaigns share characteristics with other China-linked operations we've tracked, though UAT-8302 appears to operate as a distinct cluster.
The Malware Arsenal
UAT-8302 deploys multiple backdoors and loaders across victim networks:
NetDraft - A .NET-based backdoor that represents a C# port of the FINALDRAFT (also known as SquidDoor) malware family. NetDraft communicates with command-and-control infrastructure through Microsoft's Graph API, routing traffic through OneDrive to blend with legitimate cloud activity. The malware was previously associated with threat clusters tracked as Ink Dragon, CL-STA-0049, Earth Alux, and REF7707.
CloudSorcerer v3 - An updated version of a backdoor Kaspersky first documented in attacks against Russian government entities in 2024. CloudSorcerer supports both OneDrive and GitHub-based C2 channels, providing redundancy if one platform blocks the attacker's infrastructure.
VShell - A remote access trojan delivered through SNOWRUST, a Rust-based variant of the SNOWLIGHT loader. VShell provides persistent access and supports file operations, command execution, and network tunneling.
The group also deploys DeedRAT, ZingDoor, and Draculoader—a shellcode loader that helps evade endpoint detection.
Attack Chain
Initial access appears to involve zero-day and N-day exploits against internet-facing web applications, though Talos did not disclose specific vulnerabilities. Once inside, UAT-8302 follows a methodical playbook:
- Reconnaissance - Operators use gogo, an open-source scanning tool, for automated network enumeration
- Credential theft - Scripts like
adconnectdump.pyextract credentials from Active Directory environments - Lateral movement - WMI and scheduled tasks enable movement across network segments
- Persistence - Malicious scheduled tasks maintain access through reboots
- Tunneling - Stowaway and anyproxy create encrypted channels for data exfiltration
The reconnaissance phase includes extensive log and audit policy enumeration—likely to understand what defensive visibility exists before conducting noisier operations.
Infrastructure and Attribution
Talos identified several C2 domains associated with UAT-8302:
- drivelivelime.com
- msiidentity.com
- trafficmanagerupdate.com
Command-and-control servers span IP addresses across multiple hosting providers: 85.209.156.3, 185.238.189.41, 103.27.108.55, and 38.54.32.244.
The overlapping tooling with other Chinese APT groups raises questions about operational relationships. NetDraft's lineage connects to at least five distinct threat clusters. CloudSorcerer appeared in operations against Russian targets. VShell has been used by Chinese-speaking actors across multiple campaigns. Either UAT-8302 has access to a shared development pipeline, or Chinese APT groups are deliberately exchanging tools to complicate attribution.
Why This Matters
UAT-8302's targeting of South American governments represents an expansion of Chinese cyber espionage into regions historically less affected by Beijing's intelligence operations. The southeastern European focus aligns with strategic interests around EU policy and NATO coordination.
Government agencies in targeted regions should audit for the indicators Talos published, which include 40+ file hashes covering NetDraft, VShell, and associated scanning tools. The use of legitimate cloud services for C2 makes network-based detection challenging—endpoint visibility becomes critical.
For organizations dealing with nation-state threats, understanding APT tradecraft helps prioritize defenses. Security teams can explore threat actor tactics in depth through resources like our recommended cybersecurity books, which cover historical campaigns from Russian and Chinese operators.
Detection Resources
Cisco released ClamAV signatures (33+) and Snort rules (40+ SIDs) for UAT-8302's malware families. Organizations using Cisco security products should ensure signature updates are applied.
Related Articles
Chinese APT Behind Palo Alto Zero-Day Shares Tools With Volt Typhoon
Unit 42 links CL-STA-1132 to Chinese state-sponsored actors exploiting CVE-2026-0300 for espionage. IOCs and attack timeline revealed after a month of active exploitation.
May 7, 2026Red Menshen Plants BPFDoor Sleeper Cells in Global Telecom Networks
China-linked APT embeds kernel-level backdoors in telecom infrastructure across Middle East and Asia. Rapid7 finds stealthy implants evading detection for years.
Mar 30, 2026Talos Exposes DKnife: China-Linked Router AitM Framework
Seven-implant Linux toolkit intercepts traffic on compromised routers, delivering ShadowPad and hijacking Android updates. Active C2 infrastructure dates to 2019.
Feb 6, 2026Mustang Panda Upgrades COOLCLIENT With Browser Credential Theft
Chinese APT adds clipboard monitoring, browser stealing, and enhanced plugins to its long-running backdoor. Government entities in Asia remain primary targets.
Jan 29, 2026