Cybersecurity researchers at Seqrite Labs have identified and tracked a sophisticated espionage group known as UNG0002, which has been conducting targeted cyberattacks across multiple Asian jurisdictions, including China, Hong Kong, and Pakistan, since May 2024.
The threat actor demonstrates advanced technical capabilities while maintaining consistent operational patterns across two major campaigns: Operation Cobalt Whisper and the more recent Operation AmberMist.
Advanced Multi-Stage Attack Methodology
UNG0002 employs a sophisticated infection chain beginning with weaponized shortcut files (LNK) embedded within CV-themed decoy documents.
The attack progression follows a deliberate sequence: malicious LNK files execute VBScript code, which then triggers batch scripts and PowerShell commands to deploy custom Remote Access Trojans (RATs).
The group has evolved from primarily using established frameworks, such as Cobalt Strike and Metasploit, to developing custom implants, including Shadow RAT, INET RAT, and Blister DLL.

Technical analysis reveals telling artifacts in the malware’s Program Database (PDB) paths, such as “C:\Users\The Freelancer\source\repos\JAN25\mustang\x64\Release\mustang.pdb” for Shadow RAT, indicating potential code names that may reference other known threat groups.
This suggests the actors deliberately mimic techniques from established threat actor playbooks to complicate attribution efforts.
Innovative Social Engineering and Evasion Techniques
The threat group has demonstrated significant innovation in social engineering tactics, notably implementing the ClickFix technique during Operation AmberMist.
This method involves creating fake CAPTCHA verification pages that trick victims into executing malicious PowerShell scripts, including instances where they spoofed Pakistan’s Ministry of Maritime Affairs website.
UNG0002 consistently abuses DLL sideloading techniques, leveraging legitimate Windows applications such as Rasphone and Node-Webkit binaries to execute malicious payloads while evading detection systems.
The group maintains persistent command and control infrastructure with consistent naming patterns, demonstrating sophisticated operational security across campaigns spanning over a year.
Their targeting strategy focuses systematically on high-value sectors including defense, electrotechnical engineering, civil aviation, gaming, software development, and academic institutions.
The use of realistic resume documents featuring fake profiles of game UI designers and computer science students from prestigious institutions shows careful reconnaissance and social engineering preparation.
Attribution and Future Implications
Seqrite Labs assesses with high confidence that UNG0002 originates from South-East Asia and focuses primarily on espionage activities.
The group’s evolution from Operation Cobalt Whisper’s 20 observed infection chains targeting defense and engineering sectors to Operation AmberMist’s expanded focus on gaming and software development indicates growing operational scope and technical sophistication.
The threat actor’s adaptability and persistent infrastructure maintenance suggest continued evolution of their capabilities, warranting ongoing monitoring by cybersecurity professionals across targeted regions and industries.
IOCs
- Non-PE [Script-Based Files, Shortcut, C2-Config, Encrypted Shellcode blobs]
| File Type | Hash (SHA-256) |
| LNK (Shortcut) | 4ca4f673e4389a352854f5feb0793dac43519ade8049b5dd9356d0cbe0f06148 |
| 55dc772d1b59c387b5f33428d5167437dc2d6e2423765f4080ee3b6a04947ae9 | |
| 4b410c47465359ef40d470c9286fb980e656698c4ee4d969c86c84fbd012af0d | |
| SCT (Scriptlet) | c49e9b556d271a853449ec915e4a929f5fa7ae04da4dc714c220ed0d703a36f7 |
| VBS (VBScript) | ad97b1c79735b1b97c4c4432cacac2fce6316889eafb41a0d97f2b0e565ee850 |
| c722651d72c47e224007c2111e0489a028521ccdf5331c92e6cd9cfe07076918 | |
| 2140adec9cde046b35634e93b83da4cc9a8aa0a71c21e32ba1dce2742314e8dc |





