Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Openai announces AI-powered employment platform to undertake LinkedIn

Russia’s APT28 launches “NotDoor” Outlook backdoor for companies in NATO countries

Using the GhoStredirector Hacks 65 Windows Server Rungan Backdoor and Gamshen IIS Module

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign
Identity

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

userBy userJuly 18, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 18, 2025Ravi LakshmananCyber Spy/Malware

Several sectors in China, Hong Kong and Pakistan are targeted by threat activity clusters tracked as UNG0002 (aka unknown group 0002) as part of a broader cyber espionage activity.

“This threat entity shows a strong preference for using shortcut files (LNK), VBScript, and post-explosion tools such as cobalt strikes and metasplots, but consistently deploys CV-themed decoy documents to seduce victims.

This activity includes two major campaigns called Operation Cobalt Whisper, which took place between May and September 2024, and what is called Operation Ambermist, which took place between January and May 2025.

Cybersecurity

The goals of these campaigns include defense, electrical engineering, energy, civil aviation, academia, healthcare, cybersecurity, gaming and software development sectors.

Operation Cobalt Whisper detailed the use of ZIP archives, first documented by Seqrite Labs in late October 2024, propagated through spear phishing attacks to provide the post-explosion framework, Cobalt Strike Beacons, using LNK and visual basic scripts as interim payloads.

“The scope and complexity of the campaign, coupled with customized lures, strongly proposes targeting efforts by the APT Group to compromise on sensitive research and intellectual property in these industries,” the company said at the time.

The Amber Mast Attack Chain has been found to use spear phishing email as a starting point to deliver and resume LNK files decorated in curriculum vitae and unleash the multi-stage infection process that leads to the deployment of INET rats and blister DLL loaders.

The alternative attack sequence detected in January 2025 has been found to redirect email recipients to fake landing pages that fake Pakistan’s Ministry of Maritime (MOMA) website.

Cybersecurity

Released via DLL sideload, Shadow Rat can establish contact with the remote server and wait for further commands. Although INET rats are rated as a modified version of the shadow rat, the Blister DLL implant acts as a shellcode loader, ultimately paving the way for an inverse shell-based implant.

The exact origin of the threat actor remains unknown, but evidence indicates that it is a group focused on espionage in Southeast Asia.

“UNG0002 represents a sophisticated and enduring threat entity in South Asia that has maintained a consistent operation across multiple Asian jurisdictions since at least May 2024,” Singa said. “This group continues to evolve its toolset, demonstrating its high adaptability and technical capabilities while maintaining consistent tactics, techniques and procedures.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIvanti Zero-Days was exploited to drop MdifyLoader and launch a cobalt strike attack in memory
Next Article China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.
user
  • Website

Related Posts

Russia’s APT28 launches “NotDoor” Outlook backdoor for companies in NATO countries

September 4, 2025

Using the GhoStredirector Hacks 65 Windows Server Rungan Backdoor and Gamshen IIS Module

September 4, 2025

Cybercriminals exploit X’s Grok AI to bypass advertising protection and spread malware to millions

September 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Openai announces AI-powered employment platform to undertake LinkedIn

Russia’s APT28 launches “NotDoor” Outlook backdoor for companies in NATO countries

Using the GhoStredirector Hacks 65 Windows Server Rungan Backdoor and Gamshen IIS Module

JetBlue uses free in-flight internet using Amazon’s project Kuiper Satellites

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.