chinese hackers exploit vulnerability

Multiple U.S. city governments have fallen victim to a sophisticated cyber infiltration campaign coordinated by Chinese-speaking hackers, who exploited a critical vulnerability in Trimble’s Cityworks asset management software. The vulnerability, designated as CVE-2025-0994, facilitated unauthorized access through Microsoft Internet Information Services (IIS), granting attackers administrative privileges across compromised municipal networks beginning in January 2025.

The campaign, tracked under identifier UAT-6382, demonstrated a clear focus on critical infrastructure components, particularly targeting water and wastewater utilities that rely heavily on Cityworks software for operations management. The attackers utilized Cobalt Strike and VShell for comprehensive system reconnaissance. The threat actors employed sophisticated phishing schemes to harvest credentials from targeted municipal employees.

After gaining initial access, the threat actors conducted extensive network reconnaissance before deploying web shells and custom malware designed for long-term covert presence within affected systems.

Initial system compromise enabled attackers to map networks and install stealthy malware for persistent unauthorized access to municipal systems.

The Cybersecurity and Infrastructure Security Agency (CISA) and Environmental Protection Agency (EPA) issued urgent security advisories warning utilities about the active exploitation, emphasizing the need for immediate patching. The attacks complement broader Chinese-linked campaigns targeting U.S. critical infrastructure sectors, including transportation and energy systems, highlighting an escalating pattern of state-sponsored cyber operations.

In response to the infiltration, Trimble released software patches and remediation guidance for the Cityworks vulnerability. Law enforcement agencies, including the Department of Justice, have intensified efforts to identify and prosecute those responsible for the attacks.

The compromise has reinforced calls for improved cybersecurity protocols and vendor risk management practices within government IT systems.

Security researchers have documented the attackers’ sophisticated tactics, which included rapid execution of malicious payloads and strategic lateral movement across compromised networks. The exploitation allowed threat actors to establish persistent access to municipal systems responsible for managing critical city infrastructure and resources.

This incident has prompted increased scrutiny of software supply chain vulnerabilities and highlighted the growing sophistication of state-sponsored cyber threats targeting U.S. government entities.

You May Also Like

Why U.S. Critical Infrastructure May Be More Vulnerable Than Ever in 2025

Despite record cybersecurity spending, America’s critical infrastructure faces devastating threats in 2025 that could leave millions without essential services. Will we be ready?

Microsoft Cuts China-Based Teams From Pentagon Projects Amid Mounting Espionage Fears

Microsoft severs ties with Chinese engineers on Pentagon projects after startling revelations about inadequate security oversight expose dangerous vulnerabilities in military systems.

CISA Sounds Alarm on Critical Mitsubishi ICS Weaknesses Threatening Global Infrastructure

Critical Mitsubishi ICS flaws expose global air conditioning systems to remote takeover, scoring a near-perfect severity rating. Your building could be next.

Iranian Hackers Eye U.S. Critical Infrastructure—Nation on Alert as Cyber Threats Escalate

Iranian hackers target U.S. critical infrastructure with sophisticated tactics, causing $4.35M in damages per breach. Can your organization withstand their next attack?