Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsLongNosedGoblin Tries to Sniff Out Governmental Affairs in Southeast Asia and Japan
LongNosedGoblin Tries to Sniff Out Governmental Affairs in Southeast Asia and Japan
Cybersecurity

LongNosedGoblin Tries to Sniff Out Governmental Affairs in Southeast Asia and Japan

•December 18, 2025
0
WeLiveSecurity
WeLiveSecurity•Dec 18, 2025

Companies Mentioned

Microsoft

Microsoft

MSFT

Google

Google

GOOG

Mozilla

Mozilla

Kaspersky

Kaspersky

ESET

ESET

Why It Matters

The use of Group Policy for lateral movement bypasses traditional endpoint defenses, raising the risk of large‑scale espionage against critical government networks. Detecting this technique is essential for regional cybersecurity resilience and for protecting sensitive state data.

Key Takeaways

  • •New China-aligned APT uses Group Policy for malware deployment
  • •Targets Southeast Asian and Japanese government agencies since 2023
  • •Custom C# tools (NosyHistorian, NosyDoor) leverage cloud C2
  • •Malware bypasses AMSI and employs AppDomainManager injection
  • •Tools shared across multiple China-aligned threat groups

Pulse Analysis

LongNosedGoblin adds a fresh entry to the roster of China‑aligned advanced persistent threats that focus on state actors in the Indo‑Pacific. First observed by ESET in early 2024, the group’s campaigns span Southeast Asian ministries and Japanese government agencies, indicating a strategic interest in regional policy and intelligence. By naming the group, researchers highlight a shift toward more sophisticated, infrastructure‑level intrusion techniques that go beyond classic phishing or ransomware payloads.

The core of LongNosedGoblin’s operation is a custom C#/.NET toolchain that exploits Windows Group Policy to push malicious binaries across an Active Directory forest. Tools such as NosyHistorian harvest browser histories to prioritize high‑value targets, while the NosyDoor backdoor leverages cloud storage services like Microsoft OneDrive and Google Drive as stealthy command‑and‑control channels. The malware also incorporates AMSI bypasses and AppDomainManager injection, allowing it to run in‑memory without triggering conventional antivirus signatures, and recent samples have been observed loading Cobalt Strike loaders through the same policy‑based delivery mechanism.

For defenders, the emergence of Group Policy abuse demands a reevaluation of detection baselines. Monitoring policy changes, auditing privileged accounts, and correlating cloud‑service traffic with internal host activity can surface the lateral‑movement patterns used by LongNosedGoblin. Moreover, the apparent sharing of NosyDoor components across multiple China‑aligned groups suggests a possible malware‑as‑a‑service ecosystem, underscoring the need for threat‑intel sharing and rapid incident response to protect critical government infrastructure.

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...