Exploits Cityworks zero-day vulnerability to deliver malware
Chinese-speaking threat actors, dubbed UAT-6382, have been exploiting a remote-code-execution vulnerability (CVE-2025-0994) in Cityworks, a popular asset management system. The attacks, which began in January 2025, target local governing bodies in the United States, focusing on utilities management systems. The threat actors deploy various web shells, including AntSword and Chopper, and use custom Rust-based loaders called TetraLoader to deliver Cobalt Strike beacons and VSHell malware. The attackers conduct reconnaissance, enumerate directories, and stage files for exfiltration. Their tooling and tactics indicate a high level of proficiency in the Chinese language, suggesting a Chinese origin for the threat group.
Pulse ID: 682f383c63fd8a92ece6dfce
Pulse Link: https://otx.alienvault.com/pulse/682f383c63fd8a92ece6dfce
Pulse Author: AlienVault
Created: 2025-05-22 14:44:12
Be advised, this data is unverified and should be considered preliminary. Always do further verification.