Cyberstorm in Taiwan: UAT-5918’s Persistent Threat from China Unmasked
UAT-5918, an info-stealing threat actor, has been targeting Taiwan since 2023 using web shells and open-source tools. Cisco Talos links them to Chinese APT groups. They exploit unpatched servers and use tools like Mimikatz for credential theft, maintaining long-term access to telecom, healthcare, and IT sectors.

Hot Take:
UAT-5918 is like the ultimate uninvited guest at a party, crashing into Taiwan’s critical infrastructure with web shells and open-source tools, while everyone else was busy playing Ping-Pong! It’s a classic case of ‘who let the hackers out?’ and why didn’t anyone patch those servers?
Key Points:
- Cisco Talos discovered UAT-5918, an APT group targeting Taiwan since 2023.
- The group exploits unpatched servers using web shells and open-source tools for persistence.
- UAT-5918 shares tactics with multiple Chinese APT groups, hinting at a shared playbook.
- They focus on Taiwan’s telecom, healthcare, IT, and critical infrastructure sectors.
- Talos published Indicators of Compromise for network defenders to identify UAT-5918 activity.
Already a member? Log in here
