New China-linked hacker group spies on governments in Southeast Asia, Japan
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要理解这篇文章讲的是什么。看起来是关于一个新的中国支持的黑客组织,他们攻击东南亚和日本的政府机构。这个组织的名字叫LongNosedGoblin,使用了一种叫做Group Policy的Windows功能来传播恶意软件。他们用了一些工具,比如NosyHistorian来收集浏览器历史,然后决定攻击目标。 接下来,我需要把这些信息浓缩到100字以内。重点包括:新黑客组织、目标地区、使用的技术手段、主要工具和目的。可能还要提到他们使用的恶意软件和攻击策略。 然后,我要确保语言简洁明了,不使用复杂的术语,同时涵盖所有关键点。比如,“中国支持的黑客组织LongNosedGoblin自2023年9月起活跃”、“利用Windows的Group Policy传播恶意软件”、“主要工具包括NosyHistorian收集浏览器历史”、“目标为东南亚及日本政府机构”。 最后,检查字数是否在限制内,并确保没有遗漏重要信息。这样用户就能快速了解文章的主要内容了。 </think> 一个与中国有关的新黑客组织LongNosedGoblin自2023年9月起活跃于东南亚及日本政府机构网络中,利用Windows的Group Policy功能传播恶意软件,主要通过NosyHistorian收集浏览器历史以识别高价值目标,并部署后门NosyDoor等工具进行进一步攻击。 2025-12-18 20:46:16 Author: therecord.media(查看原文) 阅读量:0 收藏

A previously unknown, China-aligned hacker group has been targeting government institutions across Southeast Asia and Japan, according to new research.

The group, which Slovak cybersecurity firm ESET named LongNosedGoblin, has been active since at least September 2023 and was uncovered after the company detected new malware strains inside the network of a Southeast Asian government last year.

What sets LongNosedGoblin apart from other known China-linked threat actors is its reliance on the Group Policy, a legitimate Windows feature normally used by system administrators to enforce rules across large networks. The hackers abused this feature to deploy malware and move laterally across targeted systems.

One of the group’s primary tools is a malware strain dubbed NosyHistorian, which collects browser history from Google Chrome, Microsoft Edge and Mozilla Firefox. The stolen data is then used to decide which victims are of higher interest and where to deploy additional malware, including a backdoor known as NosyDoor.

“While we found many victims affected by NosyHistorian in the course of our original investigation between January and March 2024, only a small subset of them were compromised by NosyDoor,” ESET researchers said. Some versions of NosyDoor included safeguards designed to limit execution to specific machines, suggesting carefully selected targets.

ESET believes NosyDoor is not exclusive to LongNosedGoblin. A variant of the malware had previously been used in an attack against an organization in a European Union country, though with different tactics.

That overlap indicates NosyDoor may be offered as a commercial service to multiple China-aligned actors, the researchers said.

Other tools linked to LongNosedGoblin include NosyStealer, which exfiltrates browser data; NosyDownloader, which retrieves and runs malicious payloads in memory; and NosyLogger, a keylogging tool, ESET said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/china-linked-hacker-group-spied-on-asian-govs
如有侵权请联系:admin#unsafe.sh