Cisco Talos Uncovers UAT-8302, a China-Linked APT Targeting Governments in South America and Europe

China-Nexus APT 'UAT-8302' Uses Shared Malware Toolkit to Target Governments

HIGH
May 6, 2026
6m read
Threat ActorThreat IntelligenceCyberattack

Related Entities

Threat Actors

UAT-8302LongNosedGoblinEarth Estries

Organizations

Products & Tech

ImpacketSoftEther VPNMicrosoft OneDriveMS Graph API

Other

NetDraftCloudSorcererSNOWRUSTSNAPPYBEEZingDoor

Full Report

Executive Summary

Cisco Talos has published research on a China-nexus advanced persistent threat (APT) group tracked as UAT-8302. This group is engaged in long-term cyber-espionage campaigns with the primary goal of intelligence gathering. Their operations have targeted government organizations in South America since late 2024 and expanded to include government agencies in Southeastern Europe in 2025. The most significant characteristic of UAT-8302 is its extensive use of a shared arsenal of custom malware, including NetDraft (aka NosyDoor) and CloudSorcerer. The overlap in tooling with other known Chinese APTs, such as LongNosedGoblin and Earth Estries, points to a collaborative and possibly modular development ecosystem among these state-sponsored actors.


Threat Overview

UAT-8302 is a sophisticated threat actor focused on gaining and maintaining long-term, persistent access to sensitive government networks. While their initial access vectors are not confirmed, Talos suspects they use exploits for zero-day and n-day vulnerabilities in public-facing applications (T1190 - Exploit Public-Facing Application).

Once inside a network, the group engages in a classic APT lifecycle:

  1. Initial Foothold: Deploying a first-stage backdoor.
  2. Post-Compromise Activity: Using open-source tools like Impacket for lateral movement and credential harvesting.
  3. Payload Deployment: Deploying a variety of custom malware for long-term access and data exfiltration.
  4. C2 and Exfiltration: Abusing legitimate cloud services like Microsoft OneDrive and the MS Graph API for command-and-control (C2) to blend in with normal network traffic.

Technical Analysis

The key feature of UAT-8302 is its shared and diverse malware toolkit. This suggests that multiple Chinese APT groups may be supplied by a common development team or that they actively share tools and infrastructure.

Key Malware Families:

  • NetDraft (NosyDoor): A .NET-based backdoor previously linked to the LongNosedGoblin APT group.
  • CloudSorcerer v3: An updated version of a backdoor used in previous attacks against Russian government entities. This version likely has enhanced capabilities and evasive features.
  • SNOWRUST: A Rust-based variant of the SNOWLIGHT backdoor, used for C2 and maintaining access.
  • Shared Tools: The group also uses other malware seen in attacks by other China-nexus groups, including SNAPPYBEE (DeedRAT) and ZingDoor.

Evasion and C2 Techniques:

UAT-8302 employs several techniques to evade detection:

  • Living Off the Land: Using tools like Impacket and legitimate proxy/VPN software like Stowaway and SoftEther VPN.
  • Abuse of Cloud Services: Using Microsoft OneDrive and the MS Graph API for C2 (T1071.001 - Application Layer Protocol: Web Protocols). This makes their C2 traffic appear as legitimate Microsoft services, making it very difficult to detect and block with traditional network signatures.

MITRE ATT&CK Techniques Observed:

Impact Assessment

The activities of UAT-8302 pose a significant national security risk to the targeted countries in South America and Southeastern Europe. As a state-sponsored espionage group, their goal is the theft of sensitive government information, which could include diplomatic communications, military intelligence, economic data, and personally identifiable information of government employees. The long-term persistence they seek to achieve means they can continuously monitor and exfiltrate data over months or years. The shared nature of their toolkit complicates attribution and defense, as indicators of compromise (IOCs) from one group's campaign may not be a reliable predictor for another's, despite using the same malware.

Detection & Response

Defending against a sophisticated APT like UAT-8302 requires a defense-in-depth strategy.

  • Network Traffic Analysis (D3-NTA): While difficult, it is crucial to monitor and baseline traffic to cloud services like OneDrive. Look for anomalous patterns, such as a non-user-interactive server communicating with OneDrive, or unusual data volumes being uploaded. SSL/TLS inspection is necessary to gain visibility into this traffic.
  • Process Analysis (D3-PA): Monitor for the execution of suspicious .NET assemblies and Rust-based binaries. Use EDR to track process lineage and identify when legitimate tools like Impacket or SoftEther VPN are used in a way that is inconsistent with normal administrative activity.
  • Domain Account Monitoring (D3-DAM): Closely monitor for signs of credential dumping and lateral movement. Alerts for tools like Mimikatz (often part of Impacket's toolkit) and suspicious use of service accounts to log into multiple workstations are key indicators.
  • Patch Management: Aggressively patch public-facing applications and servers to reduce the initial attack surface.

Mitigation

  • Network Segmentation: Implement network segmentation to limit the attacker's ability to move laterally after an initial compromise. Create enclaves for critical data and restrict communication between network segments.
  • Outbound Traffic Filtering (D3-OTF): Where possible, restrict outbound access to cloud storage services from servers that do not require it. Use a web proxy to control and log all access to services like OneDrive.
  • Privileged Account Management: Implement strict controls on privileged accounts. Use just-in-time access and multi-factor authentication for all administrative actions to make credential theft and lateral movement more difficult.
  • Application Hardening (D3-AH): Harden public-facing web applications to prevent common vulnerability classes that could be used for initial access.

Timeline of Events

1
October 1, 2024
UAT-8302 campaign against government entities in South America begins.
2
January 1, 2025
UAT-8302 expands its campaign to target government agencies in Southeastern Europe.
3
May 6, 2026
This article was published

MITRE ATT&CK Mitigations

Implement robust network segmentation to contain breaches and prevent lateral movement. This makes it harder for APTs like UAT-8302 to move from a compromised system to more critical assets.

Mapped D3FEND Techniques:

To detect C2 traffic hiding in legitimate cloud services, deploy SSL/TLS inspection on outbound traffic. This allows security tools to see the actual commands being sent over encrypted channels.

Mapped D3FEND Techniques:

Strictly control and monitor the use of privileged accounts. This makes it more difficult for attackers to escalate privileges and move laterally using tools like Impacket.

Mapped D3FEND Techniques:

Maintain a rigorous patch management program, especially for public-facing applications, to close the n-day vulnerabilities that APTs often use for initial access.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter UAT-8302's abuse of legitimate cloud services like OneDrive for C2, organizations must implement sophisticated Network Traffic Analysis with SSL/TLS inspection. Simply blocking OneDrive is not feasible. Instead, deploy a forward proxy or next-generation firewall capable of decrypting traffic to api.onedrive.com and graph.microsoft.com. Establish a baseline of normal traffic patterns from your environment to these services. Hunt for anomalies such as servers or service accounts initiating connections, unusually frequent check-ins, or large data uploads inconsistent with user activity. A Cloud Access Security Broker (CASB) can also help by analyzing API-level interactions with Microsoft 365, providing a more granular view to detect malicious automation versus legitimate user actions. This moves detection beyond simple IP/domain blocking to a more resilient, behavior-based approach.

UAT-8302's use of Impacket for lateral movement makes robust Domain Account Monitoring essential. Deploy EDR and SIEM rules to specifically detect the tell-tale signs of Impacket tools. For example, monitor for the creation of services with randomized names on remote machines (a hallmark of psexec), or an unusual number of failed logon attempts (Type 3) followed by a successful one from a single source, which can indicate password spraying. Enable and forward Windows Event Logs, particularly Security Event ID 4688 (Process Creation with Command Line), to a central SIEM. Create alerts for command lines containing 'impacket', 'secretsdump', 'wmiexec', etc. By focusing on the behavior of these tools rather than just their file hashes, defenders can create more durable detections against this common post-exploitation toolkit.

A strategic defense against APTs like UAT-8302 is strong network segmentation, a form of broadcast domain isolation. Assume that initial compromise is inevitable. The goal is to prevent the actor from moving from a less-sensitive compromised system (e.g., a public-facing web server) to the high-value government data stores. Implement a zero-trust architecture where communication between servers and network segments is denied by default. For example, web servers in the DMZ should not be able to initiate connections to the internal administrative network. User workstations should be on a separate VLAN from critical servers. This containment strategy severely hinders the effectiveness of lateral movement tools like Impacket and forces the attacker to be much noisier to find a path to their objective, increasing the chances of detection.

Timeline of Events

1
October 1, 2024

UAT-8302 campaign against government entities in South America begins.

2
January 1, 2025

UAT-8302 expands its campaign to target government agencies in Southeastern Europe.

Sources & References

UAT-8302 and its box full of malware
Cisco Talos (blog.talosintelligence.com) May 5, 2026
UAT-8302: China-Nexus APT Shares Tooling Across Multiple Clu - Tech Jacks Solutions
Tech Jacks Solutions (techjackssolutions.com) May 5, 2026
Cisco Talos Unmasks UAT-8302’s Global Government Espionage Network
Information Security Buzz (informationsecuritybuzz.com) May 6, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

UAT-8302APTChinaCisco TalosNetDraftCloudSorcererEspionageGovernment

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.