Ad

Chinese APT UNC5174 Targets Linux Systems with SNOWLIGHT Malware and VShell Remote Access Tool


A Chinese state-linked threat actor, UNC5174, also tracked as Uteus or Uetus, has resurfaced with a new Linux-focused cyber attack campaign. This latest operation utilizes an updated version of the known SNOWLIGHT malware and an open-source Remote Access Trojan (RAT) named VShell to compromise Linux systems with stealth and precision.


Open-Source Tools as a Double-Edged Sword

According to Sysdig security researcher Alessandra Rizzo, the campaign leverages open-source tools not only for cost efficiency but also as a means to blend in with common cybercriminals, obscuring attribution efforts:

 

“Adversaries increasingly rely on open-source tools for affordability and evasion. In this case, UNC5174's tactic helps them masquerade among low-skill threat actors, complicating nation-state attribution.”


This aligns with previous profiles of UNC5174, who has been connected to Chinese government cyber operations. The group remained dormant over the past year until their reappearance in 2025.


Attack Chain: SNOWLIGHT, GOHEAVY, and VShell

UNC5174's toolset is evolving. Previously, the group exploited vulnerabilities in Connectwise ScreenConnect and F5 BIG-IP devices to deploy SNOWLIGHT, a C-based ELF downloader. SNOWLIGHT acts as a dropper to fetch the GOHEAVY tunneler, a tool built in Golang, from C2 infrastructure tied to the SUPERSHELL framework.


Additionally, the attackers utilize GOREVERSE, a public reverse shell written in Go, which operates over SSH for stealthy backdoor access.


In January 2025, Sysdig researchers observed a new attack sequence where SNOWLIGHT delivers a fileless, in-memory VShell payload, deployed through a malicious bash script (download_backd.sh). This script installs two binaries:


  • dnsloger – linked to SNOWLIGHT

  • system_worker – associated with Sliver, another offensive security tool


These binaries ensure persistence and establish command-and-control (C2) communications.


The final payload, VShell, is a fully functional RAT, enabling remote command execution, file upload/download, and stealth control over the infected system. Sysdig emphasized:

 

“The combined use of SNOWLIGHT and VShell presents a severe threat due to their stealth, modularity, and use of WebSockets for covert C2 communications.”


macOS Also in the Crosshairs

Interestingly, both SNOWLIGHT and VShell have macOS-compatible variants. In October 2024, VShell was disguised as a fake Cloudflare authenticator app, indicating a broader cross-platform threat strategy.



Exploiting Ivanti Vulnerabilities

The French cybersecurity agency ANSSI reported that UNC5174 may have also weaponized flaws in Ivanti Cloud Service Appliance (CSA), including CVE-2024-8963CVE-2024-9380, and CVE-2024-8190. These attacks were marked by moderate sophistication and the use of public rootkit code, further highlighting the actor’s adaptability.


Meanwhile, researchers at TeamT5 exposed another Chinese-nexus group exploiting newer Ivanti vulnerabilities—CVE-2025-0282 and CVE-2025-22457—to deploy SPAWNCHIMERA, a novel malware strain. Their attacks spanned nearly 20 countries, affecting sectors in Austria, France, the UK, the U.S., Japan, South Korea, and more.


Global Cyber Tensions Escalate

The cyber offensive coincides with escalating tensions between China and the U.S., especially after China accused the NSA of launching cyberattacks on critical infrastructure during the 2025 Asian Winter Games.


The National Computer Virus Emergency Response Center (CVERC) claimed the U.S. initiated over 170,000 cyberattacks during the event, with Singapore, Germany, the Netherlands, and South Korea trailing as top sources of intrusion attempts.

 

“The U.S. government’s actions severely threaten the security of our national infrastructure and citizens' data,” said Chinese Foreign Ministry Spokesperson Lin Jian.


Key Takeaways: