Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments

Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments

Posted on December 19, 2025December 19, 2025 By CWS

A newly recognized superior persistent menace (APT) actor working out of China has been focusing on authorities entities throughout Southeast Asia and Japan, ESET reviews.

Lively since a minimum of September 2023, the hacking group is tracked as LongNosedGoblin, and stands out for using Group Coverage to deploy malware and transfer laterally inside the compromised networks.

One of many predominant instruments in LongNosedGoblin’s arsenal is a C#/.NET utility dubbed NosyHistorian, which permits the attackers to gather browser historical past from their victims.

Ought to the goal show of curiosity, the APT then deploys the NosyDoor backdoor, which was seen utilizing Microsoft OneDrive for command-and-control (C&C).

The backdoor makes use of a living-off-the-land method known as AppDomainManager injection throughout its execution chain, whereas different LongNosedGoblin instruments can bypass the Antimalware Scan Interface (AMSI).

The menace actor’s toolset additionally consists of NosyStealer, for browser information exfiltration, NosyDownloader, to fetch payloads and execute them in reminiscence, the NosyLogger keylogger, a reverse SOCKS5 proxy, and an argument runner for utility execution.

In a contemporary wave of assaults noticed since September 2025, the hacking group was seen utilizing Group Coverage to ship NosyHistorian and a possible Cobalt Strike loader.

In line with ESET, the APT depends on NosyHistorian to collect Chrome, Firefox, and Edge information from the compromised machines, to find out whether or not further payloads must be deployed.Commercial. Scroll to proceed studying.

Solely a small subset of victims was compromised with the NosyDoor backdoor, to gather metadata in regards to the contaminated system, together with machine title, username, OS model, and the present course of.

Primarily based on instructions obtained from the C&C, the malware can obtain and add information, delete information, execute shell instructions, record directories, and cargo .NET assemblies.

LongNosedGoblin was seen utilizing NosyStealer to exfiltrate Chrome and Edge information to Google Drive, and sure used NosyDownloader to deploy NosyLogger, the open supply reverse SOCKS5 proxy ReverseSocks5, and an argument runner.

LongNosedGoblin, ESET notes, is targeted on cyberespionage. The group’s focusing on overlaps with ToddyCat, whereas its tooling resembles that of Erudite Mogwai.

ESET, which says there are particular variations in TTPs between LongNosedGoblin and Erudite Mogwai, found a NosyDoor variant probably utilized by a number of China-aligned menace actors.

Associated: China-Linked Hackers Exploiting Zero-Day in Cisco Safety Gear

Associated: Google Sees 5 Chinese language Teams Exploiting React2Shell for Malware Supply

Associated: US Organizations Warned of Chinese language Malware Used for Lengthy-Time period Persistence

Associated: Chinese language Cyberspies Deploy ‘BadAudio’ Malware through Provide Chain Assaults

Security Week News Tags:APT, Asian, Chinese, Governments, LongNosedGoblin, Targeting

Post navigation

Previous Post: Scripted Sparrow Uses Automation to Generate and Send their Attack Messages
Next Post: Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations

Related Posts

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool Security Week News
Ahold Delhaize Data Breach Impacts 2.2 Million People Ahold Delhaize Data Breach Impacts 2.2 Million People Security Week News
New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout Security Week News
Cyber Risk Trends for 2026: Building Resilience, Not Just Defenses Cyber Risk Trends for 2026: Building Resilience, Not Just Defenses Security Week News
JetStream Debuts with M to Enhance AI Security JetStream Debuts with $34M to Enhance AI Security Security Week News
FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark