Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Hackers Adopt Common Tools to Evade Detection
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Chinese Hackers Adopt Common Tools to Evade Detection

Highlights

  • UNC5174 uses open-source tools like VShell and WebSockets.

  • The group targets Western governments and tech companies.

  • Adoption of common tools aids in evading detection.

Samantha Reed
Last updated: 15 April, 2025 - 7:29 pm 7:29 pm
Samantha Reed 1 month ago
Share
SHARE

A state-sponsored Chinese hacking group, UNC5174, has shifted its strategy by utilizing widely available open-source security tools to disguise its cyber activities. This adaptation allows the group to blend in with more prevalent cybercriminal operations, potentially increasing the difficulty of detection. Experts believe this move may signal a broader trend among sophisticated threat actors seeking to mask their origins and methods.

Contents
How Do Open-Source Tools Benefit UNC5174?What Targets Does UNC5174 Focus On?What Are the Implications of This Strategy Shift?

UNC5174, linked to the Chinese government, targets various entities including Western governments, technology firms, research institutions, and think tanks. By incorporating tools such as VShell, an open-source Remote Access Trojan popular among Chinese cybercriminals, and WebSockets for encrypted communications, the group enhances its ability to remain undetected during post-exploitation phases.

How Do Open-Source Tools Benefit UNC5174?

Utilizing open-source tools like VShell and WebSockets enables UNC5174 to blend in with everyday cybercriminal activities, making it harder for defenders to identify their unique signatures. This approach allows them to leverage existing, well-supported software while maintaining operational security through encrypted traffic.

What Targets Does UNC5174 Focus On?

The group primarily targets Western governmental bodies, technology companies, research institutions, and think tanks. Their sophisticated methods, including the use of the SNOWLIGHT malware family and the “dnsloger” payload, demonstrate a deep understanding of Linux-based systems, allowing for effective persistence and evasive techniques.

What Are the Implications of This Strategy Shift?

Shifting to open-source tools signifies a potential increase in the group’s operational flexibility and reduced costs. This strategy may also indicate that UNC5174 is aiming to scale its operations or diversify its targets by adopting tools that are widely recognized and utilized within the cybercriminal community.

Comparing recent activities, UNC5174 has moved away from exclusively using custom-built malware, which was previously a hallmark of their operations. This transition to widely available tools like VShell aligns with observations from cybersecurity agencies that the group is becoming more discreet and adaptable in its intrusion methods.

The group’s activities, including the exploitation of vulnerabilities such as CVE2024-8190, have been noted by agencies like the French Cybersecurity Agency ANSSI. These incidents highlight UNC5174’s capability to utilize both zero-day exploits and common intrusion sets to gain and maintain access to targeted systems.

“The lack of public documentation on VShell being employed by this threat actor is telling, as the evidence we have gathered shows that this campaign has been active since at least November 2024,”

stated Alessandra Rizzo, a threat research engineer at Sysdig.

UNC5174’s adoption of open-source tools not only aids in concealing their operations but also suggests that they may be leveraging these tools to extend their reach and effectiveness across multiple campaigns. This evolution reflects a strategic shift towards more sustainable and less conspicuous cyber espionage activities.

To safeguard against such threats, organizations should enhance their monitoring of common tools and protocols used by cybercriminals. Implementing robust detection mechanisms for open-source tools and maintaining up-to-date security measures can help in identifying and mitigating potential intrusions by groups like UNC5174.

  • UNC5174 utilizes VShell and WebSockets for stealth.
  • Targets include Western governments and tech firms.
  • Adoption of open-source tools helps evade detection.
You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

CIOs Tackle Quantum Threat in Encryption Race

FTC Seeks New Tools to Combat Deepfake Pornography

Cyberattacks Exploit Major Software Vulnerabilities, Affecting Global Infrastructure

North Korea Builds Cyber Network Resembling a Mafia Operation

Cybercriminals Invest Illicit Profits in Surprising Ventures

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Analyst Views Tesla as Leading Amid Trump Tariffs
Next Article Google AI Boosts Efforts to Decode Dolphin Communication

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Hideo Kojima Plans for His Legacy with Digital Memoir
Gaming
Tesla Pushes FSD Limits with Global Demonstrations
Electric Vehicle
US Enforces Global AI Chip Ban, Faces Geopolitical Challenges
AI
Wordle Challenges Players with Tricky Puzzle
Gaming
Huawei Unveils New Smart Watch With Health Tracking Features
Wearables
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?