Suspected Chinese Hackers Exploit Trimble Cityworks Flaw: A Comedy of Errors in Utility Management Security
Chinese crew exploits Trimble Cityworks flaw to infiltrate US local government networks. Despite Trimble’s patch, attackers sneak in like ninjas with a knack for utilities management systems, deploying webshells and custom malware. Apparently, exploiting outdated Microsoft IIS servers is still in fashion. Who knew hacking could be so retro?

Hot Take:
Well, well, well, it looks like some folks have been busy playing “Capture the Flag” with US local governments’ networks. Who knew utility management could be so thrilling? The Chinese threat actors seem to be getting their kicks out of digital sightseeing in the land of opportunity, with a side of espionage. It’s like a cyber version of a heist movie, minus the cool soundtrack.
Key Points:
- Chinese-speaking crew exploited a patched RCE flaw in Trimble Cityworks.
- Cisco’s Talos identified the group UAT-6382 as the culprits behind these intrusions.
- The flaw, CVE-2025-0994, was patched in February but was exploited even before that.
- The attacks targeted US local government networks, focusing on utility management systems.
- Tools used include AntSword, Chopper, TetraLoader, Cobalt Strike, and VShell.
Already a member? Log in here