LongNosedGoblin Tries to Sniff Out Governmental Affairs in Southeast Asia and Japan
Companies Mentioned
Why It Matters
The use of Group Policy for lateral movement bypasses traditional endpoint defenses, raising the risk of large‑scale espionage against critical government networks. Detecting this technique is essential for regional cybersecurity resilience and for protecting sensitive state data.
Key Takeaways
- •New China-aligned APT uses Group Policy for malware deployment
- •Targets Southeast Asian and Japanese government agencies since 2023
- •Custom C# tools (NosyHistorian, NosyDoor) leverage cloud C2
- •Malware bypasses AMSI and employs AppDomainManager injection
- •Tools shared across multiple China-aligned threat groups
Pulse Analysis
LongNosedGoblin adds a fresh entry to the roster of China‑aligned advanced persistent threats that focus on state actors in the Indo‑Pacific. First observed by ESET in early 2024, the group’s campaigns span Southeast Asian ministries and Japanese government agencies, indicating a strategic interest in regional policy and intelligence. By naming the group, researchers highlight a shift toward more sophisticated, infrastructure‑level intrusion techniques that go beyond classic phishing or ransomware payloads.
The core of LongNosedGoblin’s operation is a custom C#/.NET toolchain that exploits Windows Group Policy to push malicious binaries across an Active Directory forest. Tools such as NosyHistorian harvest browser histories to prioritize high‑value targets, while the NosyDoor backdoor leverages cloud storage services like Microsoft OneDrive and Google Drive as stealthy command‑and‑control channels. The malware also incorporates AMSI bypasses and AppDomainManager injection, allowing it to run in‑memory without triggering conventional antivirus signatures, and recent samples have been observed loading Cobalt Strike loaders through the same policy‑based delivery mechanism.
For defenders, the emergence of Group Policy abuse demands a reevaluation of detection baselines. Monitoring policy changes, auditing privileged accounts, and correlating cloud‑service traffic with internal host activity can surface the lateral‑movement patterns used by LongNosedGoblin. Moreover, the apparent sharing of NosyDoor components across multiple China‑aligned groups suggests a possible malware‑as‑a‑service ecosystem, underscoring the need for threat‑intel sharing and rapid incident response to protect critical government infrastructure.
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
Comments
Want to join the conversation?
Loading comments...