China-Aligned Threat Group Leverages Windows Group Policy for Espionage Malware Deployment

Published:

spot_img

Dec 18, 2025Ravie LakshmananMalware / Cloud Security

New Cyber Threat: LongNosedGoblin Targets Southeast Asia and Japan

A recently identified threat cluster, referred to as LongNosedGoblin, has emerged as a significant cyber adversary, primarily targeting governmental organizations in Southeast Asia and Japan. This revelation comes from ESET, a Slovak cybersecurity firm, which indicates that this threat group has been operational since at least September 2023, focusing on cyber espionage as their main objective.

Attack Methodology: Exploiting Group Policy for Malware Deployment

The LongNosedGoblin group employs Group Policy, a management feature for Windows systems, to distribute malware within compromised networks. According to ESET researchers Anton Cherepanov and Peter Strýček, this method allows the group to effectively manage and deploy malicious software across various systems. They leverage cloud services such as Microsoft OneDrive and Google Drive as command and control (C&C) servers, facilitating seamless communication between the compromised systems and the attackers.

Understanding Group Policy in Cyberattacks

Group Policy is essential for defining configurations for groups of users and client computers, and managing server setups on Windows. Its capabilities make it a valuable tool for attackers who aim to establish control over targeted networks, allow for easy malware deployment, and maintain a foothold in the compromised environment.

A Diverse Toolkit: Custom Malware Applications

The threat actor employs an extensive range of custom-built tools, predominantly revolving around C# and .NET applications. Key components of their toolkit include:

  • NosyHistorian: Gathers browser history from popular browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox.
  • NosyDoor: A sophisticated backdoor that facilitates commands for file exfiltration, deletion, and execution of remote shell commands. This tool notably operates via Microsoft OneDrive.
  • NosyStealer: Extracts browser data from Google Chrome and Microsoft Edge and uploads it to Google Drive in an encrypted format.
  • NosyDownloader: Responsible for downloading payloads into memory, including other tools such as NosyLogger.
  • NosyLogger: A modified keystroke logger that captures user input.

Initial Revelations and Targeted Strategy

ESET’s analysis traced the group’s activity back to February 2024, when they first detected their presence on a Southeast Asian government system. The researchers observed that the group utilized Group Policy to deploy malware across multiple systems within the same organization. Although the precise methods used for initial access remain unclear, the targeting appears to be quite specific. Notably, while many victims encountered NosyHistorian, only a select few were compromised by NosyDoor, indicating a strategically selective approach.

Examining Tactical Variations and Cross-Connections

LongNosedGoblin’s operational methods also encompass a reverse SOCKS5 proxy and tools that can record audio and video, thus enhancing their spying capabilities. Additionally, they employ a Cobalt Strike loader, a common tool used for structured penetration tests and security assessments. ESET noted potential overlaps in tactics, techniques, and procedures (TTPs) with other threat groups like ToddyCat and Erudite Mogwai, although conclusive links remain unproven.

The Broader Implications of Malware Sharing

The correlation between tools such as NosyDoor and others in the cybercriminal ecosystem raises questions about the distribution of these tools among various groups. As per ESET’s findings, a variant of NosyDoor was observed targeting an organization in an EU nation, using Yandex Disk as a C&C server. This indicates the malware’s adaptability and reinforces the idea that it may be shared across different China-aligned threat groups.

spot_img

Related articles

Recent articles

Vertiv Accelerates Deployment of Converged Physical Infrastructure for NVIDIA Vera Rubin DSX AI Factories

Vertiv Accelerates Deployment of Converged Physical Infrastructure for NVIDIA Vera Rubin DSX AI Factories Dubai, UAE: Vertiv (NYSE: VRT), a prominent player in critical digital...

Latvian and Ukrainian Authorities Dismantle Vishing Ring, Recovering €2M Stolen from EU Citizens

Latvian and Ukrainian Authorities Dismantle Vishing Ring, Recovering €2M Stolen from EU Citizens A recent operation by Latvian and Ukrainian law enforcement has led to...

Iran Strikes Tel Aviv with Cluster Warheads, Escalating Conflict After Assassination of Security Chief

Iran Strikes Tel Aviv with Cluster Warheads, Escalating Conflict After Assassination of Security Chief In a significant escalation of hostilities, Iran has launched missiles equipped...

Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888)

Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888) The Qualys Threat Research Unit has uncovered a significant Local Privilege Escalation (LPE)...