Thursday, April 24, 2025
HomeAPTUAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers

UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers

Published on

SIEM as a Service

Follow Us on Google News

A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan, particularly those in critical infrastructure sectors such as telecommunications, healthcare, and information technology.

This advanced persistent threat (APT) group is believed to be motivated by establishing long-term access for information theft and credential harvesting.

UAT-5918 gains initial access by exploiting known vulnerabilities, or N-day vulnerabilities, in unpatched web and application servers exposed to the internet.

- Advertisement - Google News

Post-Compromise Activities

Following successful exploitation, UAT-5918 conducts manual post-compromise activities focused on network reconnaissance and establishing persistence.

The group uses a variety of open-source tools, including web shells like the Chopper web shell, and networking tools such as FRPC, FScan, In-Swor, Earthworm, and Neo-reGeorg.

These tools enable the threat actor to move laterally within the compromised network, gather system information, and create new administrative user accounts.

Credential harvesting is a key tactic, employing tools like Mimikatz, LaZagne, and browser credential extractors to obtain local and domain-level user credentials.

UAT-5918 also uses tools like Impacket and WMIC for lateral movement via RDP and PowerShell remoting.

Overlaps with Other APT Groups

The tactics, techniques, and procedures (TTPs) of UAT-5918 show significant overlaps with other APT groups, including Volt Typhoon, Flax Typhoon, Earth Estries, and Dalbit.

According to Cisco Talos Report, these groups are known for targeting similar geographies and industry verticals, suggesting strategic alignment in their operations.

N-Day Vulnerabilities
Victimology and targeted verticals 

The use of tools like FRP, FScan, and In-Swor by UAT-5918 mirrors the tooling used by Tropic Trooper and Famous Sparrow.

However, some tools, such as LaZagne and SNetCracker, have not been publicly associated with these other groups, indicating possible exclusive use by UAT-5918.

To counter UAT-5918’s threats, organizations can employ various security measures.

Utilizing tools like Cisco Secure Endpoint can prevent malware execution, while Cisco Secure Email can block malicious emails.

Cisco Secure Firewall and Malware Analytics can detect and analyze malicious activity, providing comprehensive protection against such threats.

Implementing robust patch management to address N-day vulnerabilities is crucial in preventing initial access by UAT-5918 and similar APT groups.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities

A sweeping wave of suspicious online activity is putting organizations on alert as hackers...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities

A sweeping wave of suspicious online activity is putting organizations on alert as hackers...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...