China-Aligned Threat Group Leverages Windows Group Policy for Espionage Malware Deployment

Published:

spot_img

Dec 18, 2025Ravie LakshmananMalware / Cloud Security

New Cyber Threat: LongNosedGoblin Targets Southeast Asia and Japan

A recently identified threat cluster, referred to as LongNosedGoblin, has emerged as a significant cyber adversary, primarily targeting governmental organizations in Southeast Asia and Japan. This revelation comes from ESET, a Slovak cybersecurity firm, which indicates that this threat group has been operational since at least September 2023, focusing on cyber espionage as their main objective.

Attack Methodology: Exploiting Group Policy for Malware Deployment

The LongNosedGoblin group employs Group Policy, a management feature for Windows systems, to distribute malware within compromised networks. According to ESET researchers Anton Cherepanov and Peter Strýček, this method allows the group to effectively manage and deploy malicious software across various systems. They leverage cloud services such as Microsoft OneDrive and Google Drive as command and control (C&C) servers, facilitating seamless communication between the compromised systems and the attackers.

Understanding Group Policy in Cyberattacks

Group Policy is essential for defining configurations for groups of users and client computers, and managing server setups on Windows. Its capabilities make it a valuable tool for attackers who aim to establish control over targeted networks, allow for easy malware deployment, and maintain a foothold in the compromised environment.

A Diverse Toolkit: Custom Malware Applications

The threat actor employs an extensive range of custom-built tools, predominantly revolving around C# and .NET applications. Key components of their toolkit include:

  • NosyHistorian: Gathers browser history from popular browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox.
  • NosyDoor: A sophisticated backdoor that facilitates commands for file exfiltration, deletion, and execution of remote shell commands. This tool notably operates via Microsoft OneDrive.
  • NosyStealer: Extracts browser data from Google Chrome and Microsoft Edge and uploads it to Google Drive in an encrypted format.
  • NosyDownloader: Responsible for downloading payloads into memory, including other tools such as NosyLogger.
  • NosyLogger: A modified keystroke logger that captures user input.

Initial Revelations and Targeted Strategy

ESET’s analysis traced the group’s activity back to February 2024, when they first detected their presence on a Southeast Asian government system. The researchers observed that the group utilized Group Policy to deploy malware across multiple systems within the same organization. Although the precise methods used for initial access remain unclear, the targeting appears to be quite specific. Notably, while many victims encountered NosyHistorian, only a select few were compromised by NosyDoor, indicating a strategically selective approach.

Examining Tactical Variations and Cross-Connections

LongNosedGoblin’s operational methods also encompass a reverse SOCKS5 proxy and tools that can record audio and video, thus enhancing their spying capabilities. Additionally, they employ a Cobalt Strike loader, a common tool used for structured penetration tests and security assessments. ESET noted potential overlaps in tactics, techniques, and procedures (TTPs) with other threat groups like ToddyCat and Erudite Mogwai, although conclusive links remain unproven.

The Broader Implications of Malware Sharing

The correlation between tools such as NosyDoor and others in the cybercriminal ecosystem raises questions about the distribution of these tools among various groups. As per ESET’s findings, a variant of NosyDoor was observed targeting an organization in an EU nation, using Yandex Disk as a C&C server. This indicates the malware’s adaptability and reinforces the idea that it may be shared across different China-aligned threat groups.

spot_img

Related articles

Recent articles

Revealing Sophisticated Loader Used by Multiple Threat Actors in Recent Attack Campaign

Unveiling a Complex Malware Attack Campaign Recent investigations by Cyble researchers have brought to light an intricate attack campaign that showcases advanced techniques, including obfuscation...

CL0P Ransomware Strikes Gladinet CentreStack in Latest Attack

CL0P Ransomware Targets Gladinet CentreStack in New Campaign The CL0P ransomware group has recently set its sights on Gladinet's CentreStack file servers as part of...

Samsung Unveils Galaxy Z TriFold in UAE: A New Era for Foldable Innovation

Samsung's Galaxy Z TriFold: A New Era in Foldable Technology An Innovative Leap In December 2025, Samsung Gulf Electronics unveiled the Galaxy Z TriFold, a pioneering...

Cyberattack on University of Sydney Reveals Decades of Staff and Student Data

The University of Sydney has recently confirmed a significant cybersecurity breach that has compromised personal information belonging to thousands of its current and former...