2025 Cloud-Native Security and Usage Report: How are enterprises advancing their security?  READ NOW Customers rate Sysdig top CNAPP in Customers' Choice category within Gartner® VOC report  LEARN MORE
Sysdig logo Sysdig Home
Sysdig logo
  • Platform
    • Back
    • Platform
    • Platform
      • Sysdig Secure
        CNAPP powered by runtime insights
      • Environments
      • Integrations
      • Sysdig Monitor
    • Powered By
      • Falco
        The core engine providing runtime insights to the Sysdig platform
    • hidden header
      • Sysdig Sage™ GenAI
        AI cloud security analyst with multi-step reasoning
    • SysDig 555 logo555 Benchmark
      Detect and respond to cloud attacks faster than attackers can complete them
  • Solutions
    • Back
    • Solutions
    • Real-time Cloud Security
      • Cloud-Native Application Protection Platform
        Unified cloud security to protect your cloud, containers, and workloads
      • AI Workload Security
        Detect, prioritize, and remediate active AI risk
      • Cloud Detection & Response
        Detect, investigate, and respond to threats at cloud speed
    • From Prevention to Detection & Response
      • Cloud Workload Protection
      • Vulnerability Management
      • checklist icon
        Cloud Security Posture Management
      • Cloud Identity & Entitlement Management
    • hidden
      • Container & Kubernetes Security
      • Server Threat Detection & Response
      • Infrastructure as Code Security
    • Falco logoCloud Security Requires Runtime Insights
      Real-time visibility for detection and response and rich context to prioritize what matters most
  • Company
    • Back
    • Company
    • Why Sysdig
      • Our Customers
        Hear how our customers secure and accelerate innovation in the cloud
      • Runtime Insights
        Learn how runtime insights powers real-time cloud security
      • Threat Research Team
        Get the latest threat research and security findings
    • About Sysdig
      • Who We Are
      • Leadership Team
      • Newsroom
    • Compare Sysdig
      • Aqua
      • Crowdstrike
      • Lacework
      • Orca
      • Prisma Cloud
      • SentinelOne
      • Wiz
    • Headshot of Dan Holden, VP of Cybersecurity at BigCommerceCustomer Spotlight
      BigCommerce achieves real-time cloud security
  • Open Source
    • Back
    • Open Source
    • OSS
      • Sysdig & OSS
        The future of security is open
    • Projects
      • Falco
        Detect threats in real time
      • Falco Feeds by Sysdig
        Enterprise detection rules for Falco users
      • Stratoshark
        Analyze, troubleshoot, and secure cloud environments
    • hidden
      • Open Policy Agent
        Unify policy enforcement for cloud-native environments
      • Prometheus
        Monitor cloud-native applications and Kubernetes
    • Headshot of Loris Degioanni - CTO and founder of SysdigWhy Open Source Matters
      Falco’s journey to CNCF graduation
  • Resources
    • Back
    • Resources
    • Learn
      • Blog
        Get the latest news and insights from cloud security experts
      • Learn Cloud Native
        Learn cloud and container security fundamentals
      • Content Library
        Explore cloud and container security content
    • Engage
      • Webinars & Workshops
      • Events
      • Contact Us
    • Get Support
      • Contact Support
      • Sysdig Status
      • Docs
    • Sysdig Threat Research thumbnailSysdig Threat Research
      Security research focused on the latest cloud-native security threats, vulnerabilities, and attack patterns
  • Search
    • Back
    • Best Match
      View all search results
  • Languages
    • Back
    • Language
    • Language Header – Hidden
      • Deutsch
      • English
      • Español
      • Français
      • Italiano
      • 日本語
  • Log In
    • Back
    • Log In
    • Monitor
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • AWS-AP-South
      • GCP-US-West
    • Secure
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • AWS-AP-South
      • GCP-US-West
    • Log In – 3rd Column Header – HIdden
      • Support
  • Get Demo
  • SysDig 555 logo555 Benchmark
    Detect and respond to cloud attacks faster than attackers can complete them
  1. Blog
  2. Alessandra Rizzo

Alessandra Rizzo

Threat Research

UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell

Blogs by Alessandra Rizzo

Filter By:
UNC5174
Threat Research

UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell

Alessandra Rizzo | April 15th, 2025
Back to Blog
  • Products
    • Sysdig Secure
    • Sysdig Monitor
  • Partners
    • Sysdig Partners
    • Partner Signup
    • Partner Locator
    • Integrations
    • Partner Portal
  • Company
    • About Us
    • Leadership
    • Careers
    • Newsroom
    • Contact Us
    • Legal
    • Sitemap
  • Support
    • Support
    • Sysdig Status
    • Documentation
    • Customer Success
  • Social
    • X (Formerly Twitter) logoTwitter
    • Github logoGithub
    • Slack logoSlack
    • YouTube logoYoutube
    • LinkedIn logoLinkedIn

Sysdig logo
  • ® Copyright 2025 Sysdig, Inc.
  • Privacy Policy
  • Privacy Choices
  • Subprocessors
  • Trust Center
  • Change Consent