Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

UAT-5394 (APT) – Threat Actor

February 16, 2025
Reading Time: 4 mins read
in Threat Actors
UAT-5394 (APT) – Threat Actor

UAT-5394

Location

North Korea

Date of Initial Activity

2024

Suspected Attribution 

State Sponsored Actors

Motivation

Cyberwarfare

Software

Servers
Windows

Overview

UAT-5394 is a state-sponsored North Korean cyber threat actor that has recently gained attention for its increasingly sophisticated campaigns. Operating under the auspices of the North Korean government, this group has been tied to a variety of malicious activities aimed at government entities, private corporations, and critical infrastructure sectors worldwide. Known for its relentless pursuit of espionage and cyber-enabled financial theft, UAT-5394 operates as part of North Korea’s broader APT (Advanced Persistent Threat) infrastructure, which is responsible for some of the most significant cyberattacks over the past decade. The activities of UAT-5394 are characterized by their evolving tactics, techniques, and procedures (TTPs), which demonstrate the group’s adaptability and high level of technical expertise. UAT-5394 is known for deploying sophisticated malware, including variants of the open-source remote access trojan (RAT) XenoRAT, which they have adapted into their custom tool known as MoonPeak. This malware has been used in targeted campaigns to infiltrate and compromise both government and private sector networks, with the group demonstrating a marked ability to modify and advance its malicious tools over time. UAT-5394’s operations are notable for their use of complex, multi-layered infrastructure and their ability to pivot between compromised systems, ensuring persistent access and evading detection.

Common targets

Individuals

Information

Attack Vectors

Remote Desktop Protocol (RDP)

How they operate

One of the hallmark features of UAT-5394’s operations is their development and deployment of the MoonPeak malware, a variant of the open-source XenoRAT malware family. MoonPeak has been heavily modified by the threat actor, incorporating custom features that enhance its stealth, persistence, and ability to exfiltrate sensitive data. XenoRAT, originally developed as a remote access trojan (RAT), has evolved into a powerful tool under the control of UAT-5394, allowing them to remotely monitor and manipulate victim systems. This evolution is indicative of the group’s strategic focus on long-term access to compromised networks, enabling them to gather intelligence over extended periods of time. MoonPeak itself can perform a variety of functions, from keylogging and capturing screenshots to executing commands on infected systems, making it a versatile tool in the group’s cyber espionage efforts. The infrastructure used by UAT-5394 is another critical component of their technical operations. Their infrastructure is multi-layered, employing a mix of compromised servers, self-hosted command and control (C2) systems, and VPNs to maintain operational security and evade detection. The threat actor is known to pivot between C2 servers, frequently altering their configurations to avoid the shutdown of their infrastructure. For example, UAT-5394 transitioned from using legitimate cloud hosting services to setting up their own server infrastructure after discovering that cloud services could be easily shut down by providers. This shift not only demonstrates the group’s adaptability but also enhances their control over their operations, providing them with more reliable and persistent access points. A particularly concerning technical aspect of UAT-5394’s operations is their use of RDP (Remote Desktop Protocol) to remotely access compromised systems. By exploiting RDP connections, they can seamlessly move laterally across networks, installing additional malware, accessing sensitive data, and exfiltrating information without triggering alerts. This method is frequently used in tandem with the MoonPeak malware to ensure that even if initial access points are compromised, the attackers can maintain a foothold in the network. UAT-5394 has also been observed accessing C2 servers from various VPN nodes, further obscuring their presence and making detection by cybersecurity systems more difficult. In addition to RDP, the group uses several other advanced tactics to exploit vulnerabilities in systems. This includes targeting unpatched software vulnerabilities, manipulating memory through buffer overflow techniques, and exploiting zero-day flaws in widely used applications. The threat actor is also known to use fileless malware techniques, enabling them to execute payloads without writing files to disk, making detection more challenging for traditional antivirus systems. Their ability to exploit both new and existing vulnerabilities is a testament to their deep understanding of system architecture and security weaknesses. UAT-5394’s operational infrastructure also includes test environments where the group develops, stages, and tests their malware before deploying it in the wild. These test environments, which consist of virtual machines and staging servers, allow the attackers to refine their malware, ensuring it operates smoothly in a variety of environments before it reaches its targets. These controlled environments are crucial for fine-tuning their attacks and maximizing the effectiveness of their malware. The group also conducts extensive reconnaissance of their targets, gathering intelligence about vulnerabilities and security configurations before initiating an attack. This preparatory work allows them to tailor their approach, ensuring that their malware is highly effective against specific organizations or industries. The ability to continuously evolve their TTPs, maintain flexible infrastructure, and exploit both new and existing vulnerabilities makes UAT-5394 a formidable threat actor. Their sophisticated approach to cyber espionage and sabotage, combined with their technical prowess in malware development, infrastructure management, and exploitation of system weaknesses, places them among the most advanced state-sponsored cybercriminal groups in operation today. As UAT-5394 continues to refine its tools and methods, it poses an ongoing risk to critical infrastructure worldwide, highlighting the need for organizations to adopt comprehensive, multi-layered cybersecurity strategies.  
References:
  • UAT-5394
  • MoonPeak malware from North Korean actors unveils new details on attacker infrastructure
Tags: APTGovernmentMoonPeakNorth KoreaRATThreat ActorsUAT-5394VPNWindowsXenoRAT
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial