Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware

China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware

Posted on December 19, 2025December 19, 2025 By CWS

A classy cyberespionage marketing campaign concentrating on governmental entities in Southeast Asia and Japan has unveiled a brand new China-aligned risk actor dubbed LongNosedGoblin.

Energetic since not less than September 2023, this superior persistent risk (APT) group distinguishes itself by leveraging a various toolset of customized C#/.NET malware households.

Their operations primarily deal with intelligence gathering, using stealthy strategies to infiltrate delicate networks and keep long-term entry with out detection.

The group’s most notable tactic entails the abuse of Home windows Group Coverage for lateral motion and malware deployment.

By compromising the Energetic Listing infrastructure, attackers distribute malicious payloads throughout networked machines, successfully bypassing conventional perimeter defenses.

This technique permits them to propagate instruments like NosyHistorian, which harvests browser historical past to determine high-value targets for additional exploitation of crucial property.

Welivesecurity analysts recognized the malware in early 2024 inside a Southeast Asian authorities community, the place a number of machines had been compromised concurrently through Group Coverage updates.

Investigations revealed that the attackers disguised their malware as official coverage information, resembling Historical past.ini or Registry.pol, to mix into the Group Coverage cache directories.

This strategic camouflage highlights the group’s emphasis on evasion and persistence inside compromised environments.

NosyDoor Execution Mechanism

The group’s major backdoor, NosyDoor, exemplifies their reliance on living-off-the-land strategies and cloud-based command and management infrastructure.

NosyDoor execution chain (Supply – Welivesecurity)

The malware operates by way of a posh three-stage execution chain. NosyDoor execution chain, designed to evade detection by normal safety merchandise.

The an infection begins with a dropper part that decrypts embedded payloads utilizing the Knowledge Encryption Commonplace (DES) with the important thing UevAppMo.

This dropper makes use of execution guardrails. Dropper code with execution guardrails, to make sure the malware solely detonates on particular sufferer machines.

NDropper code with execution guardrails (Supply – Welivesecurity)

As soon as validated, it establishes persistence by making a scheduled job that executes a official Home windows binary, UevAppMonitor.exe, which the malware copies from System32 to the .NET framework listing.

The core of the evasion technique lies in AppDomainManager injection. The attackers modify the configuration of the official executable to load a malicious DLL.

Content material of UevAppMonitor.exe.config with specified AppDomainManager (Supply – Welivesecurity)

This configuration file directs the appliance to initialize a customized area from SharedReg.dll. This DLL bypasses the Antimalware Scan Interface (AMSI) and decrypts the ultimate NosyDoor payload.

NosyStealer execution chain (Supply – Welivesecurity)

The backdoor then retrieves its configuration. Decrypted configuration (log.cached, beautified), and initiates communication with Microsoft OneDrive utilizing RSA-encrypted metadata to obtain instructions saved in job information.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:APT, ChinaAligned, Deploy, Exploit, Group, Hackers, Malware, Policy, Windows

Post navigation

Previous Post: Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
Next Post: Clop Ransomware Group Exploiting Gladinet CentreStack Servers to Steal Data

Related Posts

Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics Cyber Security News
Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses Cyber Security News
Popular Chrome Extension with Over 6 Million Installs Captures User Inputs to AI Chatbots Popular Chrome Extension with Over 6 Million Installs Captures User Inputs to AI Chatbots Cyber Security News
UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device Cyber Security News
Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks Cyber Security News
APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News