Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments

Posted on December 19, 2025December 19, 2025 By CWS

A newly recognized superior persistent menace (APT) actor working out of China has been focusing on authorities entities throughout Southeast Asia and Japan, ESET reviews.

Lively since a minimum of September 2023, the hacking group is tracked as LongNosedGoblin, and stands out for using Group Coverage to deploy malware and transfer laterally inside the compromised networks.

One of many predominant instruments in LongNosedGoblin’s arsenal is a C#/.NET utility dubbed NosyHistorian, which permits the attackers to gather browser historical past from their victims.

Ought to the goal show of curiosity, the APT then deploys the NosyDoor backdoor, which was seen utilizing Microsoft OneDrive for command-and-control (C&C).

The backdoor makes use of a living-off-the-land method known as AppDomainManager injection throughout its execution chain, whereas different LongNosedGoblin instruments can bypass the Antimalware Scan Interface (AMSI).

The menace actor’s toolset additionally consists of NosyStealer, for browser information exfiltration, NosyDownloader, to fetch payloads and execute them in reminiscence, the NosyLogger keylogger, a reverse SOCKS5 proxy, and an argument runner for utility execution.

In a contemporary wave of assaults noticed since September 2025, the hacking group was seen utilizing Group Coverage to ship NosyHistorian and a possible Cobalt Strike loader.

In line with ESET, the APT depends on NosyHistorian to collect Chrome, Firefox, and Edge information from the compromised machines, to find out whether or not further payloads must be deployed.Commercial. Scroll to proceed studying.

Solely a small subset of victims was compromised with the NosyDoor backdoor, to gather metadata in regards to the contaminated system, together with machine title, username, OS model, and the present course of.

Primarily based on instructions obtained from the C&C, the malware can obtain and add information, delete information, execute shell instructions, record directories, and cargo .NET assemblies.

LongNosedGoblin was seen utilizing NosyStealer to exfiltrate Chrome and Edge information to Google Drive, and sure used NosyDownloader to deploy NosyLogger, the open supply reverse SOCKS5 proxy ReverseSocks5, and an argument runner.

LongNosedGoblin, ESET notes, is targeted on cyberespionage. The group’s focusing on overlaps with ToddyCat, whereas its tooling resembles that of Erudite Mogwai.

ESET, which says there are particular variations in TTPs between LongNosedGoblin and Erudite Mogwai, found a NosyDoor variant probably utilized by a number of China-aligned menace actors.

Associated: China-Linked Hackers Exploiting Zero-Day in Cisco Safety Gear

Associated: Google Sees 5 Chinese language Teams Exploiting React2Shell for Malware Supply

Associated: US Organizations Warned of Chinese language Malware Used for Lengthy-Time period Persistence

Associated: Chinese language Cyberspies Deploy ‘BadAudio’ Malware through Provide Chain Assaults

Security Week News Tags:APT, Asian, Chinese, Governments, LongNosedGoblin, Targeting

Post navigation

Previous Post: Scripted Sparrow Uses Automation to Generate and Send their Attack Messages
Next Post: Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations

Related Posts

Cyberattack Targets International Criminal Court Security Week News
Echo Raises $35 Million in Series A Funding Security Week News
Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments Security Week News
Tonic Security Launches With $7 Million in Seed Funding Security Week News
High-Value NPM Developers Compromised in New Phishing Campaign Security Week News
CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
  • Thailand Conference Launches International Initiative to Fight Online Scams
  • 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks
  • Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence
  • BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
  • Thailand Conference Launches International Initiative to Fight Online Scams
  • 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks
  • Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence
  • BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark