Shadow Campaigns: The Asian Espionage Group That Hacked 70 Governments While Nobody Was Looking
TGR-STA-1030, a state-backed Asian threat group, breached 70+ government and critical infrastructure organizations across 37 countries since January 2024. They exfiltrated financial negotiations, military updates, and banking info using Cobalt Strike, web shells, and eBPF rootkits.
Somewhere in Asia, a threat actor has been quietly rummaging through the digital filing cabinets of governments worldwide for over a year now. And by rummaging, I mean successfully breaching at least 70 government and critical infrastructure organizations across 37 countries.
Palo Alto Networks' Unit 42 dropped the findings last week, and they're about as comforting as you'd expect. The group, tracked as TGR-STA-1030—a temporary designation indicating state-backed motivation—has been operating since January 2024. Their victim list reads like a geopolitical who's who: five national-level law enforcement and border control agencies, three ministries of finance, plus departments handling economic, trade, natural resources, and diplomatic functions.
The scale of their reconnaissance is even more troubling. Between November and December 2025 alone, TGR-STA-1030 was observed actively probing government infrastructure associated with 155 countries. That's not a typo. They were essentially mapping out the digital attack surface of most of the planet.
Their initial access method is almost boringly simple: phishing emails with links to MEGA, the New Zealand-based file hosting service. The link drops a ZIP file containing a loader called Diaoyu and an empty PNG file that acts as an anti-sandbox tripwire. No image file? Malware terminates. It's a clever way to dodge automated analysis environments that don't perfectly replicate the original download conditions.
What happens next is where things get sophisticated. The loader checks for security products from Avira, Bitdefender, Kaspersky, Sentinel One, and Symantec, then proceeds to pull down additional images from a GitHub repository disguised as "WordPress" content. These images are actually vehicles for deploying Cobalt Strike payloads.
The group's toolkit is a greatest hits collection of post-exploitation frameworks: Cobalt Strike, VShell, Havoc, Sliver, and SparkRAT. For persistence, they're using web shells like Behinder, neo-reGeorg, and Godzilla—tools frequently associated with Chinese hacking operations. They've even deployed a Linux kernel rootkit called ShadowGuard that uses eBPF technology to hide processes and files from system analysis tools.
According to Unit 42, the threat actor successfully exfiltrated some genuinely sensitive material: financial negotiations and contracts, banking and account information, and critical military-related operational updates. They maintained access to several compromised organizations for months, suggesting this is intelligence gathering, not smash-and-grab.
The attribution is deliberately vague. Unit 42 says "Asian origin" based on regional tooling, language preferences, GMT+8 operating hours, and targeting patterns aligned with events of interest in that part of the world. They're not pointing fingers at a specific nation, but they note the group prioritizes efforts against countries that have established or are exploring certain economic partnerships.
State-backed espionage might feel like someone else's problem until you realize the techniques trickle down. The phishing lures, the anti-analysis tricks, the living-off-the-land tooling—these become blueprint material for less sophisticated actors. Today it's government ministries. Tomorrow it's your client's finance department.
The fact that TGR-STA-1030 exploited N-day vulnerabilities—known bugs, not zero-days—in products from Microsoft, SAP, Atlassian, and others is a reminder that patching isn't optional. This group didn't need exotic exploits. They needed organizations that hadn't updated their software.