The cybercrime group known as 'Hazy Hawk' has been exploiting DNS misconfigurations to hijack abandoned cloud assets and trusted domains, including those belonging to the CDC and PwC, to deliver malware. This activity has been ongoing since 2023. Separately, China-linked hackers identified as UNC5221 have exploited zero-day vulnerabilities in Ivanti EPMM (CVE-2025-4427 and CVE-2025-4428) shortly after their disclosure, targeting mobile endpoints in the defense, healthcare, and finance sectors. Additionally, a critical vulnerability in Windows Server 2025 dMSA has been reported, enabling Active Directory compromise. Another Chinese-speaking threat actor, UAT-6382, has exploited a now-patched zero-day flaw in Trimble Cityworks, a GIS-based asset and work order management software used by U.S. local governments. This breach allowed the deployment of Cobalt Strike and VShell malware via a Rust-based loader named TetraLoader, enabling persistent access to multiple local government networks in the United States.
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks: https://t.co/JjP9eB5lFT by The Hacker News #infosec #cybersecurity #technology #news
⚠️ A Chinese-speaking threat actor quietly breached U.S. local gov systems via a critical flaw in Cityworks. They didn’t just break in—they stayed—deploying Cobalt Strike & VShell via Rust-based TetraLoader. Full report → https://t.co/XI7Ism2pKJ
Chinese-speaking hackers dubbed 🇨🇳 UAT-6382 have exploited a now-patched Trimble Cityworks zero-day to breach multiple local governing bodies across the US. Trimble Cityworks is a GIS-based asset management and work order management software primarily used by local governments, https://t.co/SZglAdJPia