Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign
Identity

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

userBy userJuly 18, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 18, 2025Ravi LakshmananCyber Spy/Malware

Several sectors in China, Hong Kong and Pakistan are targeted by threat activity clusters tracked as UNG0002 (aka unknown group 0002) as part of a broader cyber espionage activity.

“This threat entity shows a strong preference for using shortcut files (LNK), VBScript, and post-explosion tools such as cobalt strikes and metasplots, but consistently deploys CV-themed decoy documents to seduce victims.

This activity includes two major campaigns called Operation Cobalt Whisper, which took place between May and September 2024, and what is called Operation Ambermist, which took place between January and May 2025.

Cybersecurity

The goals of these campaigns include defense, electrical engineering, energy, civil aviation, academia, healthcare, cybersecurity, gaming and software development sectors.

Operation Cobalt Whisper detailed the use of ZIP archives, first documented by Seqrite Labs in late October 2024, propagated through spear phishing attacks to provide the post-explosion framework, Cobalt Strike Beacons, using LNK and visual basic scripts as interim payloads.

“The scope and complexity of the campaign, coupled with customized lures, strongly proposes targeting efforts by the APT Group to compromise on sensitive research and intellectual property in these industries,” the company said at the time.

The Amber Mast Attack Chain has been found to use spear phishing email as a starting point to deliver and resume LNK files decorated in curriculum vitae and unleash the multi-stage infection process that leads to the deployment of INET rats and blister DLL loaders.

The alternative attack sequence detected in January 2025 has been found to redirect email recipients to fake landing pages that fake Pakistan’s Ministry of Maritime (MOMA) website.

Cybersecurity

Released via DLL sideload, Shadow Rat can establish contact with the remote server and wait for further commands. Although INET rats are rated as a modified version of the shadow rat, the Blister DLL implant acts as a shellcode loader, ultimately paving the way for an inverse shell-based implant.

The exact origin of the threat actor remains unknown, but evidence indicates that it is a group focused on espionage in Southeast Asia.

“UNG0002 represents a sophisticated and enduring threat entity in South Asia that has maintained a consistent operation across multiple Asian jurisdictions since at least May 2024,” Singa said. “This group continues to evolve its toolset, demonstrating its high adaptability and technical capabilities while maintaining consistent tactics, techniques and procedures.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIvanti Zero-Days was exploited to drop MdifyLoader and launch a cobalt strike attack in memory
Next Article China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

Ivanti Zero-Days was exploited to drop MdifyLoader and launch a cobalt strike attack in memory

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

Ivanti Zero-Days was exploited to drop MdifyLoader and launch a cobalt strike attack in memory

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.