Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments

Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments

Posted on December 19, 2025December 19, 2025 By CWS

A newly recognized superior persistent menace (APT) actor working out of China has been focusing on authorities entities throughout Southeast Asia and Japan, ESET reviews.

Lively since a minimum of September 2023, the hacking group is tracked as LongNosedGoblin, and stands out for using Group Coverage to deploy malware and transfer laterally inside the compromised networks.

One of many predominant instruments in LongNosedGoblin’s arsenal is a C#/.NET utility dubbed NosyHistorian, which permits the attackers to gather browser historical past from their victims.

Ought to the goal show of curiosity, the APT then deploys the NosyDoor backdoor, which was seen utilizing Microsoft OneDrive for command-and-control (C&C).

The backdoor makes use of a living-off-the-land method known as AppDomainManager injection throughout its execution chain, whereas different LongNosedGoblin instruments can bypass the Antimalware Scan Interface (AMSI).

The menace actor’s toolset additionally consists of NosyStealer, for browser information exfiltration, NosyDownloader, to fetch payloads and execute them in reminiscence, the NosyLogger keylogger, a reverse SOCKS5 proxy, and an argument runner for utility execution.

In a contemporary wave of assaults noticed since September 2025, the hacking group was seen utilizing Group Coverage to ship NosyHistorian and a possible Cobalt Strike loader.

In line with ESET, the APT depends on NosyHistorian to collect Chrome, Firefox, and Edge information from the compromised machines, to find out whether or not further payloads must be deployed.Commercial. Scroll to proceed studying.

Solely a small subset of victims was compromised with the NosyDoor backdoor, to gather metadata in regards to the contaminated system, together with machine title, username, OS model, and the present course of.

Primarily based on instructions obtained from the C&C, the malware can obtain and add information, delete information, execute shell instructions, record directories, and cargo .NET assemblies.

LongNosedGoblin was seen utilizing NosyStealer to exfiltrate Chrome and Edge information to Google Drive, and sure used NosyDownloader to deploy NosyLogger, the open supply reverse SOCKS5 proxy ReverseSocks5, and an argument runner.

LongNosedGoblin, ESET notes, is targeted on cyberespionage. The group’s focusing on overlaps with ToddyCat, whereas its tooling resembles that of Erudite Mogwai.

ESET, which says there are particular variations in TTPs between LongNosedGoblin and Erudite Mogwai, found a NosyDoor variant probably utilized by a number of China-aligned menace actors.

Associated: China-Linked Hackers Exploiting Zero-Day in Cisco Safety Gear

Associated: Google Sees 5 Chinese language Teams Exploiting React2Shell for Malware Supply

Associated: US Organizations Warned of Chinese language Malware Used for Lengthy-Time period Persistence

Associated: Chinese language Cyberspies Deploy ‘BadAudio’ Malware through Provide Chain Assaults

Security Week News Tags:APT, Asian, Chinese, Governments, LongNosedGoblin, Targeting

Post navigation

Previous Post: Scripted Sparrow Uses Automation to Generate and Send their Attack Messages
Next Post: Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations

Related Posts

Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Security Week News
CodeAnt AI Raises  Million for Code Quality and Application Security Platform  CodeAnt AI Raises $2 Million for Code Quality and Application Security Platform  Security Week News
54 Charged in US Over ATM Attacks Involving ‘Ploutus’ Malware 54 Charged in US Over ATM Attacks Involving ‘Ploutus’ Malware Security Week News
vBulletin Vulnerability Exploited in the Wild vBulletin Vulnerability Exploited in the Wild Security Week News
Thousands of SaaS Apps Could Still Be Susceptible to nOAuth Thousands of SaaS Apps Could Still Be Susceptible to nOAuth Security Week News
EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News