Loading cryptocurrency prices...

UNG0002 Espionage Hits Asian Sectors With LNK, RAT Malware Waves

UNG0002 Cyber Espionage Group Targets Multiple Sectors in China, Hong Kong, and Pakistan with Sophisticated Malware Campaigns (May 2024–May 2025)

  • Cyber espionage campaigns targeted organizations in China, Hong Kong, and Pakistan between May 2024 and May 2025.
  • The threat group known as UNG0002 used spear-phishing emails and decoy files to deliver Malware.
  • Major sectors affected include defense, engineering, energy, civil aviation, academia, and software development.
  • The group relied on tools like LNK files, VBScript, Cobalt Strike, and Metasploit for attacks.
  • Researchers suspect the attacker is a sophisticated group from South Asia with evolving tactics.

Multiple industries in China, Hong Kong, and Pakistan were targeted in a cyber espionage operation carried out by a threat group called UNG0002 from May 2024 to May 2025. The attacks used spear-phishing emails with decoy documents to gain entry and deliver malicious software to victims.

- Advertisement -

According to Seqrite Labs researcher Subhajeet Singha, the campaigns included the use of shortcut files (LNK), VBScript, and post-infection frameworks such as Cobalt Strike and Metasploit. Targets included sectors like defense, electrotechnical engineering, energy, civil aviation, medical institutions, academia, and gaming.

The campaign was split into two operations: Operation Cobalt Whisper, which ran from May to September 2024, and Operation AmberMist, active from January to May 2025. Seqrite Labs first reported Operation Cobalt Whisper in October 2024. Attackers distributed ZIP archives via spear-phishing, which contained malicious LNK and Visual Basic Scripts leading to Cobalt Strike deployment.

Singha stated, “This threat entity demonstrates a strong preference for using shortcut files (LNK), VBScript, and post-exploitation tools such as Cobalt Strike and Metasploit, while consistently deploying CV-themed decoy documents to lure victims.” More information is available in the official report.

In Operation AmberMist, spear-phishing emails delivered LNK files disguised as resumes, starting a series of malware infections involving INET RAT and Blister DLL loader. Some attack paths also led victims to fake websites copying Pakistan’s Ministry of Maritime Affairs, tricking them into running PowerShell commands, which executed Shadow RAT malware.

- Advertisement -

Shadow RAT connects with remote servers to receive commands. The variant INET RAT is believed to be a modified version of Shadow RAT. The Blister DLL loader delivers malicious code and sets up further access with a reverse-shell implant.

Researchers believe UNG0002 is a persistent and adaptable group, likely from South Asia. Singha concluded, “UNG0002 represents a sophisticated and persistent threat entity from South Asia that has maintained consistent operations targeting multiple Asian jurisdictions since at least May 2024.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Theta Partners with Ulsan HD FC to Launch AI Fan Agent

THETA Network partners with Ulsan HD FC, South Korea’s football club and three-time K...

Semler Scientific Shareholder Sues to Block Strive Bitcoin Merger

A shareholder filed a lawsuit to block the merger of Semler Scientific and Strive,...

The 15 Best Crypto Advertising Networks to Grow Your Project

You've launched your crypto project. You've got the tech, the tokenomics, and maybe even...

71 Nations Dump Dollar as Gold Buying Surges, JPMorgan Warns

The share of U.S. dollar reserves worldwide has dropped below 60% for the first...

Bitcoin Risks Deeper Drop as $107K Support Faces Critical Test

Bitcoin’s recovery after Friday’s crash remains weak, with prices hovering just above a key...
- Advertisement -

Must Read

10 Best Crypto Audiobooks You Don’t Want to Miss

So, you are getting tired of reading books and you want to switch to audiobooks that talk about cryptocurrencies. Well, today we are going...