{"id":232647,"date":"2026-03-06T01:22:33","date_gmt":"2026-03-06T07:22:33","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2026\/03\/chinese-state-hackers-target-telcos-with-new-malware-toolkit"},"modified":"2026-03-06T01:22:33","modified_gmt":"2026-03-06T07:22:33","slug":"chinese-state-hackers-target-telcos-with-new-malware-toolkit","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2026\/03\/chinese-state-hackers-target-telcos-with-new-malware-toolkit","title":{"rendered":"Chinese state hackers target telcos with new malware toolkit"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/chinese-state-hackers-target-telcos-with-new-malware-toolkit.jpg\"><\/a><\/p>\n<p>A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices.<\/p>\n<p>According to Cisco Talos researchers, the adversary is closely associated with the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-famoussparrow-hackers-deploy-upgraded-malware-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">FamousSparrow<\/a> and Tropic Trooper hacker groups, but is tracked as a separate activity cluster.<\/p>\n<p>This assessment has high confidence and is based on similar tooling, tactics, techniques, and procedures (TTPs), and victimology observed in attacks attributed to the threat actors.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices. According to Cisco Talos researchers, the adversary is closely associated with the FamousSparrow and Tropic Trooper hacker groups, but is tracked as a separate activity cluster. This assessment has [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-232647","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/232647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=232647"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/232647\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=232647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=232647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=232647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}