Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns

Posted on July 18, 2025July 18, 2025 By CWS

Jul 18, 2025Ravie LakshmananCyber Espionage / Malware
A number of sectors in China, Hong Kong, and Pakistan have develop into the goal of a menace exercise cluster tracked as UNG0002 (aka Unknown Group 0002) as a part of a broader cyber espionage marketing campaign.
“This menace entity demonstrates a powerful choice for utilizing shortcut information (LNK), VBScript, and post-exploitation instruments corresponding to Cobalt Strike and Metasploit, whereas persistently deploying CV-themed decoy paperwork to lure victims,” Seqrite Labs researcher Subhajeet Singha stated in a report revealed this week.
The exercise encompasses two main campaigns, one referred to as Operation Cobalt Whisper which occurred between Could and September 2024, and Operation AmberMist that occurred between January and Could 2025.

Targets of those campaigns embody protection, electrotechnical engineering, vitality, civil aviation, academia, medical establishments, cybersecurity, gaming, and software program improvement sectors.
Operation Cobalt Whisper was first documented by Seqrite Labs in late October 2024, detailing using ZIP archives propagated by way of spear-phishing assaults to ship Cobalt Strike beacons, a post-exploitation framework, utilizing LNK and Visible Primary Scripts as interim payloads.
“The scope and complexity of the marketing campaign, coupled with the tailor-made lures, strongly counsel a focused effort by an APT group to compromise delicate analysis and mental property in these industries,” the corporate famous on the time.

The AmberMist assault chains have been discovered to leverage spear-phishing emails as a place to begin to ship LNK information masquerading as curriculum vitae and resumes to unleash a multi-stage an infection course of that ends in the deployment of INET RAT and Blister DLL loader.
Alternate assault sequences detected in January 2025 have been discovered to redirect e mail recipients to faux touchdown pages spoofing Pakistan’s Ministry of Maritime Affairs (MoMA) web site to serve faux CAPTCHA verification checks that make use of ClickFix techniques to launch PowerShell instructions, that are used to execute Shadow RAT.

Shadow RAT, launched by way of DLL side-loading, is able to establishing contact with a distant server to await additional instructions. INET RAT is assessed to be a modified model of Shadow RAT, whereas the Blister DLL implant features as a shellcode loader, ultimately paving the way in which for a reverse-shell primarily based implant.
The precise origins of the menace actor stay unclear, however proof factors to it being an espionage-focused group from Southeast Asia.
“UNG0002 represents a classy and protracted menace entity from South Asia that has maintained constant operations focusing on a number of Asian jurisdictions since at the very least Could 2024,” Singha stated. “The group demonstrates excessive adaptability and technical proficiency, constantly evolving their toolset whereas sustaining constant techniques, methods, and procedures.”

The Hacker News Tags:Campaigns, China, Files, Group, Hits, Hong, Kong, LNK, Pakistan, RATs, Twin, UNG0002

Post navigation

Previous Post: Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks
Next Post: China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

Related Posts

AI Agents Act Like Employees With Root Access—Here’s How to Regain Control The Hacker News
Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies The Hacker News
X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts The Hacker News
New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News
GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark