Home / Companies / Sysdig / Blog / Post Details
Content Deep Dive

UNC5174's evolution in China's ongoing cyber warfare: From SNOWLIGHT to VShell

Blog post from Sysdig

Post Details
Company
Date Published
Author
Alessandra Rizzo
Word Count
4,757
Language
English
Hacker News Points
-
Summary

UNC5174, a Chinese state-sponsored threat actor, has been identified by the Sysdig Threat Research Team as using a new open-source tool called VShell in its cyber campaigns, which involve sophisticated techniques like fileless malware and the use of WebSockets for command and control. Previously known for deploying the open-source reverse shell tool SUPERSHELL, UNC5174 now employs VShell, considered superior to the Cobalt Strike framework, to conduct espionage and broker access to compromised environments. The campaign involves using SNOWLIGHT malware to drop a fileless VShell payload, which operates entirely in memory, making it difficult to detect. UNC5174 targets entities in Western countries, including research institutions, government organizations, and critical infrastructure sectors, with their operations blending with non-state-sponsored hackers to complicate attribution. The threat actor's techniques, including phishing, social engineering, and domain squatting, demonstrate advanced capabilities and a focus on remaining under the radar while continuing to support Chinese government objectives.