China-Aligned Threat Group Leverages Windows Group Policy for Espionage Malware Deployment

Published:

spot_img

Dec 18, 2025Ravie LakshmananMalware / Cloud Security

New Cyber Threat: LongNosedGoblin Targets Southeast Asia and Japan

A recently identified threat cluster, referred to as LongNosedGoblin, has emerged as a significant cyber adversary, primarily targeting governmental organizations in Southeast Asia and Japan. This revelation comes from ESET, a Slovak cybersecurity firm, which indicates that this threat group has been operational since at least September 2023, focusing on cyber espionage as their main objective.

Attack Methodology: Exploiting Group Policy for Malware Deployment

The LongNosedGoblin group employs Group Policy, a management feature for Windows systems, to distribute malware within compromised networks. According to ESET researchers Anton Cherepanov and Peter Strýček, this method allows the group to effectively manage and deploy malicious software across various systems. They leverage cloud services such as Microsoft OneDrive and Google Drive as command and control (C&C) servers, facilitating seamless communication between the compromised systems and the attackers.

Understanding Group Policy in Cyberattacks

Group Policy is essential for defining configurations for groups of users and client computers, and managing server setups on Windows. Its capabilities make it a valuable tool for attackers who aim to establish control over targeted networks, allow for easy malware deployment, and maintain a foothold in the compromised environment.

A Diverse Toolkit: Custom Malware Applications

The threat actor employs an extensive range of custom-built tools, predominantly revolving around C# and .NET applications. Key components of their toolkit include:

  • NosyHistorian: Gathers browser history from popular browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox.
  • NosyDoor: A sophisticated backdoor that facilitates commands for file exfiltration, deletion, and execution of remote shell commands. This tool notably operates via Microsoft OneDrive.
  • NosyStealer: Extracts browser data from Google Chrome and Microsoft Edge and uploads it to Google Drive in an encrypted format.
  • NosyDownloader: Responsible for downloading payloads into memory, including other tools such as NosyLogger.
  • NosyLogger: A modified keystroke logger that captures user input.

Initial Revelations and Targeted Strategy

ESET’s analysis traced the group’s activity back to February 2024, when they first detected their presence on a Southeast Asian government system. The researchers observed that the group utilized Group Policy to deploy malware across multiple systems within the same organization. Although the precise methods used for initial access remain unclear, the targeting appears to be quite specific. Notably, while many victims encountered NosyHistorian, only a select few were compromised by NosyDoor, indicating a strategically selective approach.

Examining Tactical Variations and Cross-Connections

LongNosedGoblin’s operational methods also encompass a reverse SOCKS5 proxy and tools that can record audio and video, thus enhancing their spying capabilities. Additionally, they employ a Cobalt Strike loader, a common tool used for structured penetration tests and security assessments. ESET noted potential overlaps in tactics, techniques, and procedures (TTPs) with other threat groups like ToddyCat and Erudite Mogwai, although conclusive links remain unproven.

The Broader Implications of Malware Sharing

The correlation between tools such as NosyDoor and others in the cybercriminal ecosystem raises questions about the distribution of these tools among various groups. As per ESET’s findings, a variant of NosyDoor was observed targeting an organization in an EU nation, using Yandex Disk as a C&C server. This indicates the malware’s adaptability and reinforces the idea that it may be shared across different China-aligned threat groups.

spot_img

Related articles

Recent articles

Dubai Showcases Advanced Manufacturing Ecosystem at ‘Make it in the Emirates 2026’

Dubai Showcases Advanced Manufacturing Ecosystem at 'Make it in the Emirates 2026' Strategic Participation in a Key Industrial Forum The Dubai Department of Economy and Tourism...

Pilibhit DIOS Scam Investigation Uncovers ₹5 Crore Siphoned Through Relatives’ Accounts

Pilibhit DIOS Scam Investigation Uncovers ₹5 Crore Siphoned Through Relatives' Accounts The ongoing investigation into a significant ₹5 crore scam linked to the District Inspector...

Zambia Postpones RightsCon 2026, Raising Alarms Over Human Rights Commitment

Zambia Postpones RightsCon 2026, Raising Alarms Over Human Rights Commitment The Zambian government's recent decision to postpone RightsCon 2026, effectively canceling the summit, has sparked...

Cybersecurity Alert: SMS Blaster Arrests, 38 OpenEMR Vulnerabilities, 610K Roblox Accounts Hacked, and 25 More Threats

Cybersecurity Alert: SMS Blaster Arrests, 38 OpenEMR Vulnerabilities, 610K Roblox Accounts Hacked, and 25 More Threats In a week marked by significant cybersecurity incidents, authorities...