Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-aligned threat group uses Windows Group Policy to deploy espionage malware
Identity

China-aligned threat group uses Windows Group Policy to deploy espionage malware

userBy userDecember 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 18, 2025Ravi LakshmananMalware/Cloud Security

A previously undocumented Chinese-aligned threat cluster called “LongNosed Goblin” is believed to have resulted from a series of cyberattacks targeting government agencies in Southeast Asia and Japan.

Slovak cybersecurity company ESET said in a report released today that the ultimate goal of these attacks is cyber espionage. The threat activity cluster is assessed to have been active since at least September 2023.

“LongNosed Goblin leverages Group Policy to deploy malware across compromised networks, deploying cloud services (such as Microsoft OneDrive and Google Drive) as command and control (C&C) servers,” security researchers Anton Cherepanov and Peter Strýček said in a statement.

Group Policy is a mechanism for managing settings and permissions on Windows machines. According to Microsoft, Group Policy can be used to define the configuration of groups of users and client computers and to manage server computers.

cyber security

This attack is characterized by the use of a variety of custom toolsets, primarily comprised of C#/.NET applications.

NosyHistorian, NosyDoor, which collects browser history from Google Chrome, Microsoft Edge, and Mozilla Firefox, a backdoor that uses Microsoft OneDrive as a C&C and executes commands that allow file extraction, file deletion, and shell command execution NosyStealer, which extracts browser data from Google Chrome and Microsoft Edge to Google Drive in the form of encrypted TAR archives; NosyDownloader, NosyLogger NosyLogger, a modified version of DuckSharp used to log keystrokes, downloads and executes in-memory payloads such as

NosyDoor execution chain

ESET said it first detected activity related to the hacking group on the systems of a government agency in Southeast Asia in February 2024, and ultimately discovered that Group Policy was being used to distribute malware to multiple systems in the same organization. The exact initial access method used in the attack is currently unknown.

Further analysis reveals that while many victims were affected by NosyHistorian between January and March 2024, only a portion of these victims were infected by NosyDoor, indicating a more targeted approach. In some cases, droppers used to deploy backdoors using AppDomainManager injection have been found to contain “execution guardrails” designed to restrict operations on specific victim machines.

LongNosed Goblin also employs other tools such as a reverse SOCKS5 proxy, a utility used to run a video recorder that captures audio and video, and the Cobalt Strike loader.

cyber security

The cybersecurity firm noted that the attacker’s modus operandi shares slight overlap with clusters tracked as ToddyCat and Erudite Mogwai, but stressed the lack of conclusive evidence linking them. However, the similarities between NosyDoor and LuckyStrike Agent, and the presence of the phrase “Paid Version” in LuckyStrike Agent’s PDB path, raise the possibility that this malware could be sold or licensed to other threat actors.

“We subsequently identified another instance of the NosyDoor variant targeting organizations in EU member states, again using a different TTP and using the Yandex Disk cloud service as a C&C server,” the researchers said. “The use of this NosyDoor variant suggests that this malware may be being shared among multiple Chinese-aligned threat groups.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrump Media to merge with fusion power company TAE Technologies in deal worth more than $6 billion
Next Article Research suggests the time of day you receive cancer treatment is important
user
  • Website

Related Posts

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025

Cracked software and YouTube videos spread CountLoader and GachiLoader malware

December 19, 2025

WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Elon Musk’s $56 billion Tesla pay package reinstated by Delaware Supreme Court

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.