Chinese Hackers Unleash Chaos on U.S. Governments: Trimble Cityworks Flaw Exploited

Chinese threat actors exploited a Trimble Cityworks flaw to breach U.S. local government networks, deploying malware with more speed than a caffeinated cheetah. Using tools like AntSword and TetraLoader, they gained access, proving once again that not all heroes wear capes—some write malware in Simplified Chinese.

Pro Dashboard

Hot Take:

Looks like UAT-6382 has taken the express train from Beijing to Breachville, USA! These cyber ninjas have turned a patched Trimble Cityworks vulnerability into their personal playground, deploying malware like they’re handing out free samples. Trimble Cityworks, more like Trimble Citywreks, am I right? It’s a classic case of “I thought we fixed that,” but clearly, someone forgot to tell the hackers!

Key Points:

  • UAT-6382, a Chinese-speaking threat actor, exploited a patched Trimble Cityworks vulnerability.
  • The vulnerability, CVE-2025-0994, allows remote code execution via deserialization of untrusted data.
  • Threat actors deployed web shells and malware like Cobalt Strike and VShell on compromised systems.
  • TetraLoader, a Rust-based malware loader, was used to inject payloads into benign processes.
  • Cisco Talos published indicators of compromise (IOCs) related to these attacks.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?