Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Asian Cyber Group Infiltrates 70 Global Organizations

Asian Cyber Group Infiltrates 70 Global Organizations

Posted on February 6, 2026 By CWS

A previously unknown cyber espionage collective, identified as TGR-STA-1030, has reportedly compromised the networks of over 70 governmental and critical infrastructure organizations in 37 countries over the past year. This revelation comes from a report by Palo Alto Networks’ Unit 42, highlighting the pervasive threat this group poses to global security.

Extensive Global Reach

The cyber group has been conducting detailed reconnaissance on government infrastructures linked to 155 countries from November to December 2025. Among the entities breached are five national law enforcement and border control agencies, three ministries of finance, and various other governmental departments involved in economic, trade, natural resources, and diplomatic activities.

Tracked as TGR-STA-1030, where ‘TGR’ denotes temporary threat group and ‘STA’ indicates state-backed intent, the group has been active since January 2024. Although the group’s exact origin is not confirmed, evidence suggests an Asian provenance, based on their operational tools, preferences, and timing.

Intricate Phishing Techniques

The attack strategy of TGR-STA-1030 primarily involves phishing emails that direct victims to a file hosted on the New Zealand-based service MEGA. This file contains a ZIP archive with an executable named Diaoyu Loader and a zero-byte file titled “pic1.png.” This approach is designed to bypass automated sandbox analysis.

According to Unit 42, the malware execution depends on specific conditions, such as a screen resolution of at least 1440 pixels horizontally and the presence of the “pic1.png” file in the execution directory. The malware then checks for specific cybersecurity programs, including those from Avira, Bitdefender, Kaspersky, Sentinel One, and Symantec.

Exploiting Vulnerabilities

TGR-STA-1030 has also been exploiting known vulnerabilities in software from Microsoft, SAP, Atlassian, Ruijieyi Networks, Commvault, and Eyou Email System. The group uses various tools, such as command-and-control frameworks, web shells, and tunneling utilities, frequently associated with Chinese hackers.

One significant tool used by the group is a Linux kernel rootkit named ShadowGuard, which leverages Extended Berkeley Packet Filter technology to hide processes and files from user-space analysis tools, thereby maintaining stealth.

Impact and Future Implications

The group has managed to sustain access to multiple compromised entities for extended periods, suggesting a focus on prolonged intelligence collection. TGR-STA-1030 targets government ministries and departments primarily for espionage purposes, with a particular interest in countries engaged in specific economic partnerships.

The ongoing operations of TGR-STA-1030 present a significant threat to global government and infrastructure security. Their continued focus on espionage, combined with their sophisticated methods, poses potential long-term risks to national security and critical services worldwide.

The Hacker News Tags:Asian hackers, Cobalt Strike, cyber attack, Cybersecurity, Espionage, GitHub, government breach, infrastructure security, Malware, N-day vulnerabilities, Palo Alto Networks, Phishing, ShadowGuard, TGR-STA-1030, Unit 42

Post navigation

Previous Post: APT-Q-27 Evades Detection in Corporate Cyberattack
Next Post: Major Cybersecurity Developments: DDoS, AI Espionage, ESET Fixes

Related Posts

Orchid Security Enhances Enterprise Identity Observability Orchid Security Enhances Enterprise Identity Observability The Hacker News
ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections The Hacker News
Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures The Hacker News
Firefox Introduces Easy Control to Disable AI Features Firefox Introduces Easy Control to Disable AI Features The Hacker News
Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown The Hacker News
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices
  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity
  • CISA Directs Agencies to Remove Outdated Edge Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices
  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity
  • CISA Directs Agencies to Remove Outdated Edge Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark