Global Cyber Espionage Campaign Hits Governments in 37 Countries

 

A massive cyber spying effort – linked to a government-backed group operating out of Asia – has breached governmental bodies and essential infrastructure targets in 37 nations, recent findings by Palo Alto Networks reveal. Known under the identifier TGR-STA-1030, the assault reached more than 70 institutions during the last twelve months. This intrusion ranks among the broadest state-associated hacking episodes seen since the major compromise involving SolarWinds back in 2020. 

Attack efforts targeted government bodies handling commerce, monetary policy, power resources, frontier controls, one expert noted. What makes this operation distinct is its breadth and financial angle – data points show interest in critical raw materials, ongoing commercial talks, even realignments in global partnerships. 
What stood out, per Cybersecurity Dive’s coverage, was how Palo Alto labeled the campaign – the widest state-affiliated spying push seen lately. The firm avoided naming any nation directly, yet pointed to origins across Asia, highlighting its reach alongside advanced execution. Though no explicit attribution emerged, the depth of coordination suggested a well-resourced hand behind it.
 
Five national law enforcement and border units fell victim, alongside financial branches across three countries, while several agencies handling natural resources or diplomacy also faced breaches. Targeted entities ranged from Taiwan’s state-backed electrical infrastructure provider to Mongolia’s federal policing body, including Indonesia’s senior administrative figure, the Czech legislative chamber plus its defense command, and Brazil’s energy regulatory office. 
State-linked telecom enterprises were impacted too, scattered through different regions without pattern.

Peter Renals, principal security researcher with Palo Alto’s Unit 42 threat intelligence team, told Axios that government agencies and critical infrastructure organizations in the United States and United Kingdom were not impacted.

Timing of the cyber intrusions seemed tightly linked to key political and economic moments. Around a month prior to Honduras’ presidential vote – marked by discussions on Taiwan relations – numerous state-linked IPs faced targeting. 

Meanwhile, in Mexico, suspicious digital actions emerged after news broke about trade probes connected to upcoming tariff decisions.

Facing rising cyber threats, European authorities saw increased digital intrusions. After Czech leader Petr Pavel met with the Dalai Lama, scans appeared across defense, law enforcement, legislative, and administrative systems in the country. In parallel, German infrastructure came under scrutiny – close to five hundred public-sector internet addresses were probed that summer. 

Though separate events, both incidents pointed toward coordinated probing of state-level networks.

Beginning with digital deception, the group used fake emails alongside unpatched security holes to enter systems. Exploiting weaknesses in tools like Microsoft Exchange Server and SAP Solution Manager was observed by analysts tracking their moves. Hidden inside compromised machines, a stealthy program named ShadowGuard took root beneath regular operating layers. 

This custom-built tool ran deep in Linux environments, masking operations where most scans rarely look.

Alone between November and December, scans hit infrastructure across 155 nations – evidence of persistent probing ahead of possible follow-up actions. Though Palo Alto Networks alerted impacted governments and collaborators, the group behind the activit

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: