InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: China-aligned threat group uses Windows Group Policy to deploy espionage malware
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > China-aligned threat group uses Windows Group Policy to deploy espionage malware
Technology

China-aligned threat group uses Windows Group Policy to deploy espionage malware

December 19, 2025 4 Min Read
Share

A previously undocumented Chinese-aligned threat cluster called “LongNosed Goblin” is believed to have resulted from a series of cyberattacks targeting government agencies in Southeast Asia and Japan.

Slovak cybersecurity company ESET said in a report released today that the ultimate goal of these attacks is cyber espionage. The threat activity cluster is assessed to have been active since at least September 2023.

“LongNosed Goblin leverages Group Policy to deploy malware across compromised networks, deploying cloud services (such as Microsoft OneDrive and Google Drive) as command and control (C&C) servers,” security researchers Anton Cherepanov and Peter Strýček said in a statement.

Group Policy is a mechanism for managing settings and permissions on Windows machines. According to Microsoft, Group Policy can be used to define the configuration of groups of users and client computers and to manage server computers.

This attack is characterized by the use of a variety of custom toolsets, primarily comprised of C#/.NET applications.

  • NosyHistorian collects browser history from Google Chrome, Microsoft Edge, Mozilla Firefox
  • NosyDoor is a backdoor that uses Microsoft OneDrive as a C&C and executes commands that allow file extraction, file deletion, and shell command execution.
  • NosyStealer extracts browser data from Google Chrome and Microsoft Edge to Google Drive in the form of encrypted TAR archives
  • Downloads and executes payloads such as NosyDownloader, NosyLogger, etc. into memory.
  • NosyLogger, a modified version of DuckSharp used to log keystrokes
NosyDoor execution chain

ESET said it first detected activity related to the hacking group on the systems of a government agency in Southeast Asia in February 2024, and ultimately discovered that Group Policy was being used to distribute malware to multiple systems in the same organization. The exact initial access method used in the attack is currently unknown.

See also  New Fluent Bit flaw exposes cloud to RCE and stealth infrastructure intrusions

Further analysis reveals that while many victims were affected by NosyHistorian between January and March 2024, only a portion of these victims were infected by NosyDoor, indicating a more targeted approach. In some cases, droppers used to deploy backdoors using AppDomainManager injection have been found to contain “execution guardrails” designed to restrict operations on specific victim machines.

LongNosed Goblin also employs other tools such as a reverse SOCKS5 proxy, a utility used to run a video recorder that captures audio and video, and the Cobalt Strike loader.

The cybersecurity firm noted that the attacker’s modus operandi shares slight overlap with clusters tracked as ToddyCat and Erudite Mogwai, but stressed the lack of conclusive evidence linking them. However, the similarities between NosyDoor and LuckyStrike Agent, and the presence of the phrase “Paid Version” in LuckyStrike Agent’s PDB path, raise the possibility that this malware could be sold or licensed to other threat actors.

“We subsequently identified another instance of the NosyDoor variant targeting organizations in EU member states, again using a different TTP and using the Yandex Disk cloud service as a C&C server,” the researchers said. “The use of this NosyDoor variant suggests that this malware may be being shared among multiple Chinese-aligned threat groups.”

Share This Article
Twitter Copy Link
Previous Article Unlike the US, the French government encourages the use of VPNs amid concerns about WiFi security Unlike the US, the French government encourages the use of VPNs amid concerns about WiFi security
Next Article Who can pay for Trump's economy? Americans are feeling the Grinch Who can pay for Trump’s economy? Americans are feeling the Grinch

You Might Also Like

Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware
Technology

Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware

3 Min Read
comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack
Technology

comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack

5 Min Read
Zero-click agent browser attack could delete entire Google Drive using crafted email
Technology

Zero-click agent browser attack could delete entire Google Drive using crafted email

5 Min Read
Smishing Triad links to 194,000 malicious domains in global phishing operation
Technology

Smishing Triad links to 194,000 malicious domains in global phishing operation

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?