Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

US local governments targeted by Chinese hackers

Avast cybersecurity.

  • Multiple US government agencies were targeted by Chinese hackers, Cisco Talos warns
  • The hackers used a bug in Trimble Cityworks
  • The vulnerability was fixed in February this year

Local government organizations across the United States were recently targeted by a Chinese threat actor looking to deploy various web shells and malware loaders. This is according to cybersecurity researchers Cisco Talos, who have been tracking the attacks since early 2025.

Cisco says the threat actors are tracked as UAT-6382 (usually short for Unknown Adversary Threat), and have been targeting organizations through a zero-day vulnerability in Trimble Cityworks.

Trimble Cityworks is a Geographic Information System (GIS) asset management and permitting software designed to help local governments and utilities manage infrastructure, maintenance, and operations efficiently.

In February this year, we reported the software was vulnerable to CVE-2025-0994, a high-severity deserialization bug with a severity score of 8.6 (high). The vulnerability allowed threat actors to perform remote code execution (RCE).

Cisco said the attackers used the zero-day to drop a Rust-based malware loader which, in turn, installed Cobalt Strike beacons and VSHell malware, which provided the Chinese with long-term, persistent access.

Patching the flaw

"Talos has found intrusions in enterprise networks of local governing bodies in the United States (U.S.), beginning January 2025 when initial exploitation first took place. Upon gaining access, UAT-6382 expressed a clear interest in pivoting to systems related to utilities management," Cisco said in its security advisory.

With access established, the attackers started dropping different web shells: AntSword, chinatso/Chopper, and more. All of these are written in Chinese. They were also dropping a custom loader called TetraLoader, which was written in Simplified Chinese.

As soon as news of the zero-day broke, Trimble released a patch, bringing Cityworks to versions 15.8.9 and 23.10 and mitigating the risk. It also warned about discovering some on-prem deployments having overprivileged IIS identity permissions, and added that some deployments haid incorrect attachment directory configurations.

At the time, there were no reports of victims or damages, but the US Cybersecurity and Infrastructure Agency (CISA) still released a coordinated advisory, urging customers to apply the patches as soon as possible. In early February, the agency added it to KEV, giving Federal Civilian Executive Branch agencies a deadline to patch.

Via BleepingComputer

You might also like

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.