Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Asian Cyber Group Infiltrates 70 Global Organizations

Asian Cyber Group Infiltrates 70 Global Organizations

Posted on February 6, 2026 By CWS

A previously unknown cyber espionage collective, identified as TGR-STA-1030, has reportedly compromised the networks of over 70 governmental and critical infrastructure organizations in 37 countries over the past year. This revelation comes from a report by Palo Alto Networks’ Unit 42, highlighting the pervasive threat this group poses to global security.

Extensive Global Reach

The cyber group has been conducting detailed reconnaissance on government infrastructures linked to 155 countries from November to December 2025. Among the entities breached are five national law enforcement and border control agencies, three ministries of finance, and various other governmental departments involved in economic, trade, natural resources, and diplomatic activities.

Tracked as TGR-STA-1030, where ‘TGR’ denotes temporary threat group and ‘STA’ indicates state-backed intent, the group has been active since January 2024. Although the group’s exact origin is not confirmed, evidence suggests an Asian provenance, based on their operational tools, preferences, and timing.

Intricate Phishing Techniques

The attack strategy of TGR-STA-1030 primarily involves phishing emails that direct victims to a file hosted on the New Zealand-based service MEGA. This file contains a ZIP archive with an executable named Diaoyu Loader and a zero-byte file titled “pic1.png.” This approach is designed to bypass automated sandbox analysis.

According to Unit 42, the malware execution depends on specific conditions, such as a screen resolution of at least 1440 pixels horizontally and the presence of the “pic1.png” file in the execution directory. The malware then checks for specific cybersecurity programs, including those from Avira, Bitdefender, Kaspersky, Sentinel One, and Symantec.

Exploiting Vulnerabilities

TGR-STA-1030 has also been exploiting known vulnerabilities in software from Microsoft, SAP, Atlassian, Ruijieyi Networks, Commvault, and Eyou Email System. The group uses various tools, such as command-and-control frameworks, web shells, and tunneling utilities, frequently associated with Chinese hackers.

One significant tool used by the group is a Linux kernel rootkit named ShadowGuard, which leverages Extended Berkeley Packet Filter technology to hide processes and files from user-space analysis tools, thereby maintaining stealth.

Impact and Future Implications

The group has managed to sustain access to multiple compromised entities for extended periods, suggesting a focus on prolonged intelligence collection. TGR-STA-1030 targets government ministries and departments primarily for espionage purposes, with a particular interest in countries engaged in specific economic partnerships.

The ongoing operations of TGR-STA-1030 present a significant threat to global government and infrastructure security. Their continued focus on espionage, combined with their sophisticated methods, poses potential long-term risks to national security and critical services worldwide.

The Hacker News Tags:Asian hackers, Cobalt Strike, cyber attack, Cybersecurity, Espionage, GitHub, government breach, infrastructure security, Malware, N-day vulnerabilities, Palo Alto Networks, Phishing, ShadowGuard, TGR-STA-1030, Unit 42

Post navigation

Previous Post: APT-Q-27 Evades Detection in Corporate Cyberattack
Next Post: Major Cybersecurity Developments: DDoS, AI Espionage, ESET Fixes

Related Posts

Docker Patches Critical AI Vulnerability in Ask Gordon Docker Patches Critical AI Vulnerability in Ask Gordon The Hacker News
NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems The Hacker News
China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems The Hacker News
Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers The Hacker News
Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud The Hacker News
Why IT Leaders Must Rethink Backup in the Age of Ransomware Why IT Leaders Must Rethink Backup in the Age of Ransomware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity
  • CISA Directs Agencies to Remove Outdated Edge Devices
  • Flickr Security Breach Exposes User Data
  • Major Cybersecurity Developments: DDoS, AI Espionage, ESET Fixes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity
  • CISA Directs Agencies to Remove Outdated Edge Devices
  • Flickr Security Breach Exposes User Data
  • Major Cybersecurity Developments: DDoS, AI Espionage, ESET Fixes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark