BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

UNG0002 Espionage Hits Asian Sectors With LNK, RAT Malware Waves

UNG0002 Cyber Espionage Group Targets Multiple Sectors in China, Hong Kong, and Pakistan with Sophisticated Malware Campaigns (May 2024–May 2025)

  • Cyber espionage campaigns targeted organizations in China, Hong Kong, and Pakistan between May 2024 and May 2025.
  • The threat group known as UNG0002 used spear-phishing emails and decoy files to deliver Malware.
  • Major sectors affected include defense, engineering, energy, civil aviation, academia, and software development.
  • The group relied on tools like LNK files, VBScript, Cobalt Strike, and Metasploit for attacks.
  • Researchers suspect the attacker is a sophisticated group from South Asia with evolving tactics.

Multiple industries in China, Hong Kong, and Pakistan were targeted in a cyber espionage operation carried out by a threat group called UNG0002 from May 2024 to May 2025. The attacks used spear-phishing emails with decoy documents to gain entry and deliver malicious software to victims.

- Advertisement -

According to Seqrite Labs researcher Subhajeet Singha, the campaigns included the use of shortcut files (LNK), VBScript, and post-infection frameworks such as Cobalt Strike and Metasploit. Targets included sectors like defense, electrotechnical engineering, energy, civil aviation, medical institutions, academia, and gaming.

The campaign was split into two operations: Operation Cobalt Whisper, which ran from May to September 2024, and Operation AmberMist, active from January to May 2025. Seqrite Labs first reported Operation Cobalt Whisper in October 2024. Attackers distributed ZIP archives via spear-phishing, which contained malicious LNK and Visual Basic Scripts leading to Cobalt Strike deployment.

Singha stated, “This threat entity demonstrates a strong preference for using shortcut files (LNK), VBScript, and post-exploitation tools such as Cobalt Strike and Metasploit, while consistently deploying CV-themed decoy documents to lure victims.” More information is available in the official report.

In Operation AmberMist, spear-phishing emails delivered LNK files disguised as resumes, starting a series of malware infections involving INET RAT and Blister DLL loader. Some attack paths also led victims to fake websites copying Pakistan’s Ministry of Maritime Affairs, tricking them into running PowerShell commands, which executed Shadow RAT malware.

- Advertisement -

Shadow RAT connects with remote servers to receive commands. The variant INET RAT is believed to be a modified version of Shadow RAT. The Blister DLL loader delivers malicious code and sets up further access with a reverse-shell implant.

Researchers believe UNG0002 is a persistent and adaptable group, likely from South Asia. Singha concluded, “UNG0002 represents a sophisticated and persistent threat entity from South Asia that has maintained consistent operations targeting multiple Asian jurisdictions since at least May 2024.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Wall Street Seeks Blockchain Guardrails Against North Korean Hackers

Beyond the Kelp DAO hack, Wall Street firms are increasingly concerned about their fiduciary...

Americans Wary of Crypto, AI Despite Industry PAC Spending

Majority of Americans are skeptical of crypto and AI, with 45% seeing crypto as...

Shiba Inu’s 2021 Peak: Did Vitalik’s Burn Make It Possible?

Shiba Inu's 2021 rally to an all-time high of $0.00008616 was significantly influenced by...

NY AG James Secures $5M from Uphold Over Fraudulent Crypto Product

New York Attorney General Letitia James secured over $5 million from crypto platform Uphold...

Linux ‘Copy Fail’ bug exploited, root access at risk

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical Linux flaw to...

Must Read

How To Buy a Handshake Domain: A Step-by-Step Guide

Handshake Domains | Benefits | Drawbacks | How To Buy | Supported BrowsersIn this step-by-step guide, I am going to show you how to...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading