Close Menu
  • Home
  • AI & Technology
  • Politics
  • Business
  • Cryptocurrency
  • Sports
  • Finance
  • Fitness
  • Gadgets
  • World
  • Marketing

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

XRP Needs Higher Prices To Handle Bank-Scale Flows, Claver Says

March 27, 2026

Bitcoin Fear Hits The Floor As Big Holders Stack 62,000 Coins

March 27, 2026

Bitcoin Analyst Who Bought At $1 Revealed What Really Caused The October 10 Crash

March 27, 2026
Facebook X (Twitter) Instagram
  • Home
  • About US
  • Advertise
  • Contact US
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
MNK NewsMNK News
  • Home
  • AI & Technology
  • Politics
  • Business
  • Cryptocurrency
  • Sports
  • Finance
  • Fitness
  • Gadgets
  • World
  • Marketing
MNK NewsMNK News
Home » Google Accuses China-Linked Hackers of Targeting Diplomats in Asia
AI & Technology

Google Accuses China-Linked Hackers of Targeting Diplomats in Asia

MNK NewsBy MNK NewsAugust 26, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


The Google Threat Intelligence Group (GTIG) reported on Monday that a “complex, multifaceted campaign” by hackers linked to the Chinese government is targeting “diplomats in Southeast Asia and other entities globally.”

“GTIG assesses this was likely in support of cyber espionage operations aligned with the strategic interests of the People’s Republic of China (PRC),” the report said.

The cyber espionage campaign involved a “captive portal redirect,” which infected the targeted computer systems with a “digitally signed downloader.” The downloader, in turn, installed a spyware program on the victimized computer systems.

In other words, the hackers allegedly tricked their victims into accessing hijacked websites that infected them with a two-stage malware attack. The first stage was a seemingly legitimate download plugin for their browsers, which proceeded to pull a backdoor virus called SOGU.SEC into their computers. Users thought they were downloading innocuous software updates, but they were really getting a virus.

GTIG uncovered the scheme by noticing “redirect chains” leading from legitimate domains to highly suspicious websites controlled by hackers. The one missing piece of the puzzle was the initial attack that forced the targeted WiFi routers to bounce to the hackers’ website. Google’s security technicians were unable to observe this first step in the process when they began investigating the cyber espionage campaign in March 2025.

GTIC identified a “PRC-nexus threat actor” called UNC6384 as the culprit. Some of the web pages involved in the espionage scheme are known to be controlled by this group. Also, the highly sophisticated code that fooled victims’ computers into installing the malware by abusing legitimate functions of Microsoft Windows and cleverly concealing security violations has been employed in previous UNC6384 attacks.

“This campaign is a clear example of the continued evolution of UNC6384’s operational capabilities and highlights the sophistication of PRC-nexus threat actors,” GTIG concluded.

Senior Google security engineer Patrick Whitsell told Bloomberg News on Monday that “about two dozen victims” were infected by the malware, most of them diplomats working in Southeast Asia.

Whitsell did not disclose the nationalities of the targeted diplomats, but his team was highly confident that the hackers were “China-aligned” – either working “inside the government” or as “outside contractors.”

“I would assume diplomats have pretty sensitive documents on their laptops that they’re using for their day-to-day work. And yeah, once you’re on that device, you can get those documents,” he said.

The “UNC” prefix denotes a threat actor that has not been precisely identified yet. UNC6384 has certain similarities in tactics and preferred software tools to a Chinese hacker gang called “Mustang Panda,” which works under a number of aliases, including “TEMP.hex,” “Bronze President,” “Camaro Dragon,” ”and “Red Lich.”

The malware payload delivered in the second stage of the attack on diplomats in Southeast Asia was first detected by cybersecurity analysts in 2008. Increasingly sophisticated versions of this virus have long been popular with Chinese hacking groups.

Another clue to the identity of the culprits is that the downloader used in the first stage of the attack was digitally signed by a Chinese company called Chengdu Nuoxin Times Technology Co. Ltd. Digital signatures prompt computer systems to treat a software package as safe and legitimate.

At least 25 instances of malware signed by Chengdu Nuoxin have been discovered by GTIG over the past two years, most of them deployed by hackers linked to the Chinese government. GTIG investigated two previous large-scale cyber espionage campaigns that employed malware signed by the same company, with enough similarities to the diplomat attack to suggest they might have been carried out by the same threat actor, UNC6384. 

“It remains an open question how the threat actors are obtaining these certificates,” GTIG noted. “The Subscriber organization may be a victim with compromised code signing material. However, they may also be a willing participant or front company facilitating cyber espionage operations.”



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
MNK News
  • Website

Related Posts

FCC Chief Brendan Carr Celebrates One Year of ‘Delete, Delete, Delete’ with 38 Pages of FCC Regulations Scrapped

March 27, 2026

Mark Zuckerberg’s Meta Pushes to Become an ‘AI-Native’ Company

March 27, 2026

Epic Games Lays Off of 1,000 Workers as ‘Fortnite’ Struggles

March 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Iranian football players hold schoolbags in solidarity with girls killed in strike on Minab school

March 27, 2026

Sabalenka and Rybakina to clash again in Miami semi-final

March 27, 2026

Transgender athletes barred from female category events at Olympics

March 26, 2026

PM urged to postpone ‘unconstitutional’ PHF Congress meeting

March 25, 2026
Our Picks

XRP Needs Higher Prices To Handle Bank-Scale Flows, Claver Says

March 27, 2026

Bitcoin Fear Hits The Floor As Big Holders Stack 62,000 Coins

March 27, 2026

Bitcoin Analyst Who Bought At $1 Revealed What Really Caused The October 10 Crash

March 27, 2026

Recent Posts

  • XRP Needs Higher Prices To Handle Bank-Scale Flows, Claver Says
  • Bitcoin Fear Hits The Floor As Big Holders Stack 62,000 Coins
  • Bitcoin Analyst Who Bought At $1 Revealed What Really Caused The October 10 Crash
  • Amazon Big Spring Sale 2026: Best Fitness, Wellness, Health Deals
  • Iranian attack on Saudi base wounds at least 10 US troops

Recent Comments

No comments to show.
MNK News
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Home
  • About US
  • Advertise
  • Contact US
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2026 mnknews. Designed by mnknews.

Type above and press Enter to search. Press Esc to cancel.