China-Aligned LongNosedGoblin Malware Targets Asia-Pacific Governments

China-aligned LongNosedGoblin cyber espionage targets Southeast Asia and Japan using Windows Group Policy and cloud services for malware deployment and data theft.

  • A China-aligned Hacking group called LongNosedGoblin has targeted governments in Southeast Asia and Japan since September 2023.
  • The group uses Windows Group Policy to deploy Malware and cloud storage services for command and control (C&C) communication.
  • The attackers employ various custom tools to steal browser data, log keystrokes, and exfiltrate files using services like Microsoft OneDrive, Google Drive, and Yandex Disk.
  • LongNosedGoblin’s malware shows some similarities with other clusters but remains distinct, with potential sharing of tools among China-aligned groups.

A China-aligned cyber threat cluster named LongNosedGoblin has conducted espionage-focused cyber attacks on government entities in Southeast Asia and Japan since at least September 2023. The group uses Windows Group Policy, a system for managing computer and user settings, to spread malware within targeted networks.

- Advertisement -

Security researchers Anton Cherepanov and Peter Strýček stated that LongNosedGoblin leverages cloud services such as Microsoft OneDrive and Google Drive as command and control (C&C) servers. The attack toolkit mainly includes C#/.NET applications designed for data theft and remote control.

Their malware lineup features:
– NosyHistorian, which collects browsing histories from Google Chrome, Microsoft Edge, and Mozilla Firefox.
– NosyDoor, a backdoor that uses OneDrive for C&C and can exfiltrate or delete files, as well as execute shell commands.
– NosyStealer, which steals browser data from Chrome and Edge, encrypting it into TAR archives uploaded to Google Drive.
– NosyDownloader, used to run additional payloads like NosyLogger in memory.
– NosyLogger, a modified keylogger based on DuckSharp software, capturing keystrokes.

ESET first detected LongNosedGoblin activity in February 2024 on a Southeast Asian government system. The malware spread through Group Policy to multiple computers within the same organization. The exact method by which the attackers initially gained access remains unknown. Analysis revealed targeted deployment, as only some victims infected with NosyHistorian also received the NosyDoor backdoor, which includes “execution guardrails” to limit infections to specific machines.

Additional tools used by the group include a reverse SOCKS5 proxy, software to record audio and video, and a Cobalt Strike loader. Although the group’s tactics show weak similarities to those of ToddyCat and Erudite Mogwai clusters, firm links have not been established. The resemblance of NosyDoor to the LuckyStrike Agent malware and the phrase “Paid Version” found in LuckyStrike’s programming hint that some LongNosedGoblin tools could be commercially available or shared among China-aligned actors.

- Advertisement -

Researchers also identified a NosyDoor variant targeting an organization in the European Union, which replaced its C&C with Yandex Disk, suggesting LongNosedGoblin malware may be utilized by multiple related threat groups.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

XRP Eyes Rally as ETFs and Buy Signal Boost 2026 Hopes Surge

Ripple settled its US lawsuit in 2025, helping XRP reach a $3.65 all-time high...

Bitfinex Hacker Ilya Lichtenstein Freed Early via First Step

Ilya Lichtenstein was released from prison after serving 14 months of a five-year sentence...

Waymo’s 2026 Expansion Could Drive Big Gains for GOOGL Surge

Alphabet rallied more than 60% in 2025 and enters 2026 with investor optimism tied...

Tesla shares slip as Q4 deliveries deemed largely neutral US

Tesla delivered 418,227 vehicles in Q4, slightly below the 422,850 company-polled consensus and last...

Institutions Pour In: 2026 Poised to Ignite ETH Value Rise!!

Ethereum insiders say 2026 could trigger significant ETH value growth as institutions increase on-chain...
- Advertisement -

Must Read

7 Best Audiobooks on Cybersecurity

Cybersecurity has become an essential topic in our increasingly digital world. As technology evolves and becomes more integrated into our daily lives, the importance...
Bitcoin (BTC) $ 89,913.00 1.92%
Ethereum (ETH) $ 3,122.71 4.50%
XRP (XRP) $ 1.99 6.52%
Bittensor (TAO) $ 245.42 8.02%
Polkadot (DOT) $ 2.12 6.40%
Cardano (ADA) $ 0.388114 8.36%
Chainlink (LINK) $ 13.28 6.06%
Hyperliquid (HYPE) $ 24.58 0.76%
Monero (XMR) $ 419.74 0.04%
Hedera (HBAR) $ 0.120309 6.40%
Toncoin (TON) $ 1.81 6.80%