UNG0002 Espionage Hits Asian Sectors With LNK, RAT Malware Waves

UNG0002 Cyber Espionage Group Targets Multiple Sectors in China, Hong Kong, and Pakistan with Sophisticated Malware Campaigns (May 2024–May 2025)

  • Cyber espionage campaigns targeted organizations in China, Hong Kong, and Pakistan between May 2024 and May 2025.
  • The threat group known as UNG0002 used spear-phishing emails and decoy files to deliver Malware.
  • Major sectors affected include defense, engineering, energy, civil aviation, academia, and software development.
  • The group relied on tools like LNK files, VBScript, Cobalt Strike, and Metasploit for attacks.
  • Researchers suspect the attacker is a sophisticated group from South Asia with evolving tactics.

Multiple industries in China, Hong Kong, and Pakistan were targeted in a cyber espionage operation carried out by a threat group called UNG0002 from May 2024 to May 2025. The attacks used spear-phishing emails with decoy documents to gain entry and deliver malicious software to victims.

- Advertisement -

According to Seqrite Labs researcher Subhajeet Singha, the campaigns included the use of shortcut files (LNK), VBScript, and post-infection frameworks such as Cobalt Strike and Metasploit. Targets included sectors like defense, electrotechnical engineering, energy, civil aviation, medical institutions, academia, and gaming.

The campaign was split into two operations: Operation Cobalt Whisper, which ran from May to September 2024, and Operation AmberMist, active from January to May 2025. Seqrite Labs first reported Operation Cobalt Whisper in October 2024. Attackers distributed ZIP archives via spear-phishing, which contained malicious LNK and Visual Basic Scripts leading to Cobalt Strike deployment.

Singha stated, “This threat entity demonstrates a strong preference for using shortcut files (LNK), VBScript, and post-exploitation tools such as Cobalt Strike and Metasploit, while consistently deploying CV-themed decoy documents to lure victims.” More information is available in the official report.

In Operation AmberMist, spear-phishing emails delivered LNK files disguised as resumes, starting a series of malware infections involving INET RAT and Blister DLL loader. Some attack paths also led victims to fake websites copying Pakistan’s Ministry of Maritime Affairs, tricking them into running PowerShell commands, which executed Shadow RAT malware.

- Advertisement -

Shadow RAT connects with remote servers to receive commands. The variant INET RAT is believed to be a modified version of Shadow RAT. The Blister DLL loader delivers malicious code and sets up further access with a reverse-shell implant.

Researchers believe UNG0002 is a persistent and adaptable group, likely from South Asia. Singha concluded, “UNG0002 represents a sophisticated and persistent threat entity from South Asia that has maintained consistent operations targeting multiple Asian jurisdictions since at least May 2024.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Coinbase Exec: US Must Act on Transformative Market Bill Now

John D’Agostino of Coinbase said the CLARITY Act delay is understandable because market-structure legislation...

XRP Tops $2 on ETF Inflows, Regulatory Shift Fuels Rally Now

XRP climbed above $2 on Friday, its highest level since mid-December.SoSoValue data shows U.S....

Analyst: Exchange Wallets Skew ‘Whale Accumulation’ Data Now

Dogecoin, Cardano, and XRP led gains as short-covering and liquidations accelerated on Friday.Bitcoin traded...

Coinbase exec says CLARITY Act on right track despite delays

Coinbase executive John D’Agostino says the Digital Asset Market Clarity Act (CLARITY Act) is...

Nvidia rallies on China comeback; Wall Street eyes $300 soon

NVIDIA plans to raise H200 chip production to meet strong demand from China.President Donald...
- Advertisement -

Must Read

Top 10 Best Blockchain Games

If you want to know about the best blockchain games then read this article carefully. We listed the best games you can play and...
Bitcoin (BTC) $ 89,511.00 0.86%
Ethereum (ETH) $ 3,090.84 2.55%
XRP (XRP) $ 2.00 6.90%
Bittensor (TAO) $ 246.62 3.65%
Polkadot (DOT) $ 2.12 7.07%
Cardano (ADA) $ 0.385166 8.44%
Chainlink (LINK) $ 13.05 1.61%
Hyperliquid (HYPE) $ 24.54 0.84%
Monero (XMR) $ 428.31 2.68%
Hedera (HBAR) $ 0.117813 1.85%
Toncoin (TON) $ 1.79 5.11%