Particle.news

Download on the App Store

Cisco Talos Uncovers Mimikatz-Embedded SoundBill in UAT-7237’s Taiwan Attacks

An updated SoundBill loader embedding Mimikatz demonstrates the actor’s continued refinement of its attack toolkit

Image
Image

Overview

  • Talos attributes recent breaches of Taiwanese web servers to UAT-7237, a China-linked subgroup of UAT-5918 active since 2022.
  • Researchers observed a new variant of the bespoke SoundBill shellcode loader that carries Mimikatz for stealthier credential extraction.
  • UAT-7237 maintains long-term access through SoftEther VPN configurations set to Simplified Chinese and direct RDP sessions.
  • The threat actors deploy tools such as JuicyPotato and adjust Windows registry settings to disable UAC and store cleartext passwords.
  • Intezer reports a low-confidence sighting of an evolving FireWood backdoor variant previously linked to China-aligned operators.