Cisco Talos has published research on a China-nexus advanced persistent threat (APT) group tracked as UAT-8302. This group is engaged in long-term cyber-espionage campaigns with the primary goal of intelligence gathering. Their operations have targeted government organizations in South America since late 2024 and expanded to include government agencies in Southeastern Europe in 2025. The most significant characteristic of UAT-8302 is its extensive use of a shared arsenal of custom malware, including NetDraft (aka NosyDoor) and CloudSorcerer. The overlap in tooling with other known Chinese APTs, such as LongNosedGoblin and Earth Estries, points to a collaborative and possibly modular development ecosystem among these state-sponsored actors.
UAT-8302 is a sophisticated threat actor focused on gaining and maintaining long-term, persistent access to sensitive government networks. While their initial access vectors are not confirmed, Talos suspects they use exploits for zero-day and n-day vulnerabilities in public-facing applications (T1190 - Exploit Public-Facing Application).
Once inside a network, the group engages in a classic APT lifecycle:
The key feature of UAT-8302 is its shared and diverse malware toolkit. This suggests that multiple Chinese APT groups may be supplied by a common development team or that they actively share tools and infrastructure.
UAT-8302 employs several techniques to evade detection:
T1071.001 - Application Layer Protocol: Web Protocols). This makes their C2 traffic appear as legitimate Microsoft services, making it very difficult to detect and block with traditional network signatures.T1190 - Exploit Public-Facing Application: Suspected initial access vector.T1071.001 - Application Layer Protocol: Web Protocols: Abusing OneDrive and MS Graph API for C2.T1003 - OS Credential Dumping: Implied by the use of Impacket.T1550.002 - Use Alternate Authentication Material: Pass the Hash: A common technique enabled by Impacket for lateral movement.T1021.002 - Remote Services: SMB/Windows Admin Shares: Used for lateral movement within the compromised network.T1105 - Ingress Tool Transfer: Transferring their malware toolkit onto compromised systems.The activities of UAT-8302 pose a significant national security risk to the targeted countries in South America and Southeastern Europe. As a state-sponsored espionage group, their goal is the theft of sensitive government information, which could include diplomatic communications, military intelligence, economic data, and personally identifiable information of government employees. The long-term persistence they seek to achieve means they can continuously monitor and exfiltrate data over months or years. The shared nature of their toolkit complicates attribution and defense, as indicators of compromise (IOCs) from one group's campaign may not be a reliable predictor for another's, despite using the same malware.
Defending against a sophisticated APT like UAT-8302 requires a defense-in-depth strategy.
Implement robust network segmentation to contain breaches and prevent lateral movement. This makes it harder for APTs like UAT-8302 to move from a compromised system to more critical assets.
Mapped D3FEND Techniques:
To detect C2 traffic hiding in legitimate cloud services, deploy SSL/TLS inspection on outbound traffic. This allows security tools to see the actual commands being sent over encrypted channels.
Mapped D3FEND Techniques:
Strictly control and monitor the use of privileged accounts. This makes it more difficult for attackers to escalate privileges and move laterally using tools like Impacket.
Mapped D3FEND Techniques:
Maintain a rigorous patch management program, especially for public-facing applications, to close the n-day vulnerabilities that APTs often use for initial access.
Mapped D3FEND Techniques:
To counter UAT-8302's abuse of legitimate cloud services like OneDrive for C2, organizations must implement sophisticated Network Traffic Analysis with SSL/TLS inspection. Simply blocking OneDrive is not feasible. Instead, deploy a forward proxy or next-generation firewall capable of decrypting traffic to api.onedrive.com and graph.microsoft.com. Establish a baseline of normal traffic patterns from your environment to these services. Hunt for anomalies such as servers or service accounts initiating connections, unusually frequent check-ins, or large data uploads inconsistent with user activity. A Cloud Access Security Broker (CASB) can also help by analyzing API-level interactions with Microsoft 365, providing a more granular view to detect malicious automation versus legitimate user actions. This moves detection beyond simple IP/domain blocking to a more resilient, behavior-based approach.
UAT-8302's use of Impacket for lateral movement makes robust Domain Account Monitoring essential. Deploy EDR and SIEM rules to specifically detect the tell-tale signs of Impacket tools. For example, monitor for the creation of services with randomized names on remote machines (a hallmark of psexec), or an unusual number of failed logon attempts (Type 3) followed by a successful one from a single source, which can indicate password spraying. Enable and forward Windows Event Logs, particularly Security Event ID 4688 (Process Creation with Command Line), to a central SIEM. Create alerts for command lines containing 'impacket', 'secretsdump', 'wmiexec', etc. By focusing on the behavior of these tools rather than just their file hashes, defenders can create more durable detections against this common post-exploitation toolkit.
A strategic defense against APTs like UAT-8302 is strong network segmentation, a form of broadcast domain isolation. Assume that initial compromise is inevitable. The goal is to prevent the actor from moving from a less-sensitive compromised system (e.g., a public-facing web server) to the high-value government data stores. Implement a zero-trust architecture where communication between servers and network segments is denied by default. For example, web servers in the DMZ should not be able to initiate connections to the internal administrative network. User workstations should be on a separate VLAN from critical servers. This containment strategy severely hinders the effectiveness of lateral movement tools like Impacket and forces the attacker to be much noisier to find a path to their objective, increasing the chances of detection.
UAT-8302 campaign against government entities in South America begins.
UAT-8302 expands its campaign to target government agencies in Southeastern Europe.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.