China-Aligned Threat Group Leverages Windows Group Policy for Espionage Malware Deployment

Published:

spot_img

Dec 18, 2025Ravie LakshmananMalware / Cloud Security

New Cyber Threat: LongNosedGoblin Targets Southeast Asia and Japan

A recently identified threat cluster, referred to as LongNosedGoblin, has emerged as a significant cyber adversary, primarily targeting governmental organizations in Southeast Asia and Japan. This revelation comes from ESET, a Slovak cybersecurity firm, which indicates that this threat group has been operational since at least September 2023, focusing on cyber espionage as their main objective.

Attack Methodology: Exploiting Group Policy for Malware Deployment

The LongNosedGoblin group employs Group Policy, a management feature for Windows systems, to distribute malware within compromised networks. According to ESET researchers Anton Cherepanov and Peter Strýček, this method allows the group to effectively manage and deploy malicious software across various systems. They leverage cloud services such as Microsoft OneDrive and Google Drive as command and control (C&C) servers, facilitating seamless communication between the compromised systems and the attackers.

Understanding Group Policy in Cyberattacks

Group Policy is essential for defining configurations for groups of users and client computers, and managing server setups on Windows. Its capabilities make it a valuable tool for attackers who aim to establish control over targeted networks, allow for easy malware deployment, and maintain a foothold in the compromised environment.

A Diverse Toolkit: Custom Malware Applications

The threat actor employs an extensive range of custom-built tools, predominantly revolving around C# and .NET applications. Key components of their toolkit include:

  • NosyHistorian: Gathers browser history from popular browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox.
  • NosyDoor: A sophisticated backdoor that facilitates commands for file exfiltration, deletion, and execution of remote shell commands. This tool notably operates via Microsoft OneDrive.
  • NosyStealer: Extracts browser data from Google Chrome and Microsoft Edge and uploads it to Google Drive in an encrypted format.
  • NosyDownloader: Responsible for downloading payloads into memory, including other tools such as NosyLogger.
  • NosyLogger: A modified keystroke logger that captures user input.

Initial Revelations and Targeted Strategy

ESET’s analysis traced the group’s activity back to February 2024, when they first detected their presence on a Southeast Asian government system. The researchers observed that the group utilized Group Policy to deploy malware across multiple systems within the same organization. Although the precise methods used for initial access remain unclear, the targeting appears to be quite specific. Notably, while many victims encountered NosyHistorian, only a select few were compromised by NosyDoor, indicating a strategically selective approach.

Examining Tactical Variations and Cross-Connections

LongNosedGoblin’s operational methods also encompass a reverse SOCKS5 proxy and tools that can record audio and video, thus enhancing their spying capabilities. Additionally, they employ a Cobalt Strike loader, a common tool used for structured penetration tests and security assessments. ESET noted potential overlaps in tactics, techniques, and procedures (TTPs) with other threat groups like ToddyCat and Erudite Mogwai, although conclusive links remain unproven.

The Broader Implications of Malware Sharing

The correlation between tools such as NosyDoor and others in the cybercriminal ecosystem raises questions about the distribution of these tools among various groups. As per ESET’s findings, a variant of NosyDoor was observed targeting an organization in an EU nation, using Yandex Disk as a C&C server. This indicates the malware’s adaptability and reinforces the idea that it may be shared across different China-aligned threat groups.

spot_img

Related articles

Recent articles

Dubai to Implement Early Friday School Dismissals Starting January 2026

Changes to Dubai School Hours: Early Closures on Fridays Starting January 2026, schools in Dubai will have new Friday schedules, as announced by the Knowledge...

France Accuses of ‘Foreign Interference’ Following RAT Malware Discovery on Ferry

French authorities are currently investigating potential "foreign interference" linked to malware discovered on a passenger ferry. The remote access trojan...

FBI Takes Down E-Note Crypto Exchange Tied to Ransomware Laundering

FBI Disrupts E-Note Cryptocurrency Exchange Linked to Cybercrime The recent action by the FBI to dismantle E-Note, a cryptocurrency exchange, highlights a significant collaborative effort...

France Detains 22-Year-Old in Cyberattack on Interior Ministry

Arrest in French Interior Ministry Cyberattack: Key Developments Overview of the Cyberattack On December 17, 2025, French authorities arrested a 22-year-old individual linked to a cyberattack...