Article Details

Scrape Timestamp (UTC): 2025-07-18 18:26:45.696

Source: https://thehackernews.com/2025/07/ung0002-group-hits-china-hong-kong.html

Original Article Text

Click to Toggle View

UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns. Multiple sectors in China, Hong Kong, and Pakistan have become the target of a threat activity cluster tracked as UNG0002 (aka Unknown Group 0002) as part of a broader cyber espionage campaign. "This threat entity demonstrates a strong preference for using shortcut files (LNK), VBScript, and post-exploitation tools such as Cobalt Strike and Metasploit, while consistently deploying CV-themed decoy documents to lure victims," Seqrite Labs researcher Subhajeet Singha said in a report published this week. The activity encompasses two major campaigns, one called Operation Cobalt Whisper which took place between May and September 2024, and Operation AmberMist that occurred between January and May 2025. Targets of these campaigns include defense, electrotechnical engineering, energy, civil aviation, academia, medical institutions, cybersecurity, gaming, and software development sectors. Operation Cobalt Whisper was first documented by Seqrite Labs in late October 2024, detailing the use of ZIP archives propagated via spear-phishing attacks to deliver Cobalt Strike beacons, a post-exploitation framework, using LNK and Visual Basic Scripts as interim payloads. "The scope and complexity of the campaign, coupled with the tailored lures, strongly suggest a targeted effort by an APT group to compromise sensitive research and intellectual property in these industries," the company noted at the time. The AmberMist attack chains have been found to leverage spear-phishing emails as a starting point to deliver LNK files masquerading as curriculum vitae and resumes to unleash a multi-stage infection process that results in the deployment of INET RAT and Blister DLL loader. Alternate attack sequences detected in January 2025 have been found to redirect email recipients to fake landing pages spoofing Pakistan's Ministry of Maritime Affairs (MoMA) website to serve fake CAPTCHA verification checks that employ ClickFix tactics to launch PowerShell commands, which are used to execute Shadow RAT. Shadow RAT, launched via DLL side-loading, is capable of establishing contact with a remote server to await further commands. INET RAT is assessed to be a modified version of Shadow RAT, whereas the Blister DLL implant functions as a shellcode loader, eventually paving the way for a reverse-shell based implant. The exact origins of the threat actor remain unclear, but evidence points to it being an espionage-focused group from Southeast Asia. "UNG0002 represents a sophisticated and persistent threat entity from South Asia that has maintained consistent operations targeting multiple Asian jurisdictions since at least May 2024," Singha said. "The group demonstrates high adaptability and technical proficiency, continuously evolving their toolset while maintaining consistent tactics, techniques, and procedures."

Daily Brief Summary

NATION STATE ACTIVITY // UNG0002 Espionage Group Targets Asia with Advanced Cyber Tactics

UNG0002 group has launched cyber espionage campaigns against multiple sectors in China, Hong Kong, and Pakistan, focusing mainly on industries like defense, energy, and healthcare.

The campaigns, named Operation Cobalt Whisper and Operation AmberMist, utilized spear-phishing with LNK files and VBScripts disguised as resumes to deploy RATs and other malware.

Cobalt Strike and Metasploit post-exploitation tools were used to maintain and expand the attackers' foothold within compromised networks.

Attack strategies included fake job applications and deceptive landing pages mimicking official government platforms to deliver malware such as Shadow RAT and INET RAT.

Seqrite Labs first identified and documented these sophisticated attack tactics in their reports, outlining the persistence and evolving methods of UNG0002.

The exact origin of UNG0002 is uncertain, but evidence suggests it is a well-coordinated group from Southeast Asia specializing in espionage and intellectual property theft.

The threat group's high adaptability and technical proficiency highlight the significant cybersecurity risk they pose to targeted regions and sectors.