Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Shadow Campaigns: State-Backed Espionage Group Breaches 70+
Shadow Campaigns: State-Backed Espionage Group Breaches 70+
NEWS

Shadow Campaigns: State-Backed Espionage Group Breaches 70+

Palo Alto Unit 42 reveals a state-aligned group designated TGR-STA-1030 compromised government and critical infrastructure targets in 37 countries using...

Dylan H.

News Desk

February 7, 2026
4 min read

Massive Espionage Campaign Uncovered

Palo Alto Networks Unit 42 has disclosed one of the most far-reaching cyberespionage operations in recent memory. A state-aligned threat actor tracked as TGR-STA-1030 (also designated UNC6619) conducted reconnaissance against targets in 155 countries between November and December 2025, successfully compromising 70+ government and critical infrastructure organizations across 37 countries.

The campaign, dubbed "Shadow Campaigns," represents a significant escalation in state-sponsored cyber operations, with targets spanning government ministries, law enforcement agencies, energy infrastructure, and diplomatic services worldwide.


Targets and Scope

Confirmed Compromised Entities

The operation targeted organizations of strategic, economic, and political intelligence value:

RegionTargets
AmericasBrazil's Ministry of Mines and Energy, multiple Mexican ministries
Asia-PacificTaiwan power equipment suppliers, Malaysian government departments, Indonesian airline, Mongolian law enforcement
EuropeCzech, German, Italian, Polish, and Serbian government entities
AfricaCritical infrastructure in DRC, Djibouti, Ethiopia, Namibia, Niger, Nigeria, and Zambia
OceaniaAustralian Treasury Department (connection attempts detected)

Primary Sectors Targeted

  • Government ministries and parliaments
  • Law enforcement and border control agencies
  • Finance, trade, and diplomatic services
  • Energy and mining entities
  • Immigration authorities

Unit 42 noted a surge in reconnaissance activity against Americas-based targets during the October 2025 U.S. government shutdown, and 200+ IP scans against Honduras infrastructure 30 days before national elections, suggesting the group times operations around periods of reduced oversight.


Attack Techniques and Tooling

Initial Access

The group deployed tailored phishing emails referencing internal organizational changes, delivering malicious archives via Mega.nz containing a custom loader named Diaoyu. The actor also exploited at least 15 known vulnerabilities across SAP Solution Manager, Microsoft Exchange, D-Link devices, and Windows systems.

Custom Malware Arsenal

ToolFunction
Diaoyu loaderFetches Cobalt Strike payloads and VShell C2 agents
ShadowGuardCustom Linux eBPF rootkit capable of hiding up to 32 PIDs and concealing files containing "swsecret" at the kernel level
Behinder / GodzillaWebshells for persistent access
Neo-reGeorgTunnel proxy for pivoting through compromised infrastructure
GOST / FRPS / IOXNetwork tunneling and port forwarding tools

Evasion Techniques

The group demonstrated sophisticated anti-analysis capabilities:

  • Checks for 1440+ pixel horizontal screen resolution before executing payloads (filtering out analyst VMs)
  • Requires presence of a zero-byte file (pic1.png) before Diaoyu loader activates
  • Detects and avoids Kaspersky, Avira, Bitdefender, SentinelOne, and Norton security products
  • ShadowGuard operates at the kernel level via eBPF, making detection exceptionally difficult

The use of eBPF rootkits represents a concerning evolution in tradecraft. These kernel-level implants can intercept and manipulate system calls while remaining invisible to standard security tooling.


Attribution and Infrastructure

Unit 42 attributes the operation to an Asia-based state-aligned group with high confidence. Key attribution indicators include:

  • C2 domains mimicking target region naming conventions (.gouv extensions for French-speaking targets)
  • Infrastructure hosted across U.S., Singapore, and UK VPS providers
  • Use of residential proxies and Tor for traffic anonymization
  • A notable domain registration (dog3rj.tech) possibly referencing DOGE

The group has been active since at least January 2024, though the Shadow Campaigns surge peaked in late 2025.


Defensive Recommendations

Immediate Actions

  1. Review IOCs from Unit 42's report - Block identified domains, IPs, and file hashes across perimeter and endpoint defenses
  2. Patch the 15+ exploited vulnerabilities - Prioritize SAP Solution Manager, Microsoft Exchange, D-Link, and Windows systems
  3. Hunt for eBPF-based rootkits - Standard endpoint detection tools may miss ShadowGuard; use kernel-level inspection tools
  4. Monitor Mega.nz traffic - Unusual downloads from Mega.nz may indicate Diaoyu loader delivery

Detection Focus Areas

  • Look for Cobalt Strike and VShell C2 beaconing patterns
  • Monitor for Behinder and Godzilla webshell indicators
  • Flag GOST, FRPS, and IOX tunneling activity in network logs
  • Investigate anomalous eBPF program loading on Linux systems
  • Review DNS logs for domains mimicking government TLDs

Strategic Measures

  • Government and critical infrastructure organizations in targeted regions should assume potential compromise and conduct thorough threat hunts
  • Implement network segmentation to limit lateral movement
  • Deploy behavioral analytics to detect living-off-the-land techniques

Sources

  • BleepingComputer - State actor targets 155 countries in 'Shadow Campaigns' espionage op
  • The Hacker News - Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • Palo Alto Networks Unit 42 Threat Research

Related Articles

  • Fortinet FortiGate Mass Exploitation Underway
  • US Treasury Department Confirms Network Breach
#Nation-State#APT#Threat Intelligence#Critical Infrastructure#BleepingComputer

Related Articles

Firestarter Malware Survives Cisco Firewall Updates and Security Patches

US and UK cybersecurity agencies are warning about Firestarter, a custom implant that persists on Cisco Firepower and Secure Firewall devices running ASA...

6 min read

Authorities Disrupt APT28 Router DNS Hijacks Targeting Microsoft 365

An international law enforcement operation has dismantled FrostArmada, an APT28 campaign that hijacked DNS on compromised MikroTik and TP-Link routers to...

4 min read

TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

Proofpoint has attributed a targeted email campaign to Russian state-sponsored threat actor TA446, which is leveraging the recently disclosed DarkSword...

6 min read
Back to all News