New Threat Actor: Diaoyu Group

Asian State-Backed Espionage Targeting Global Government Infrastructure

Date: February 10, 2026

Threat Level: Critical (State-Sponsored)

Classification: Advanced Persistent Threat (APT) / Cyber Espionage

Aliases: UNC6619, “Shadow Campaigns”

A massive, previously undocumented cyber espionage campaign has been uncovered, operated by an Asian state-backed group tracked as TGR-STA-1030. Unit 42 (Palo Alto Networks) has linked this group to breaches in at least 70 organizations across 37 countries, with a distinct focus on government ministries and critical infrastructure.+1

The group is characterized by its strategic patience, use of custom loaders like “Diaoyu,” and a massive reconnaissance effort that scanned 155 countries leading up to February 2026.


1. Executive Summary & Key Findings

  • Massive Scale: In late 2025 (Nov–Dec), the group conducted active reconnaissance against government infrastructure in 155 countries—roughly 80% of the world’s nations.
  • Strategic Motivation: The targeting aligns closely with economic and geopolitical interests, specifically focusing on countries with rare earth mineral resources, international trade deals, and diplomatic tensions in the South China Sea.
  • The “Diaoyu” Marker: Analysis of the malware metadata revealed the original filename Diaoyu.exe. “Diaoyu” (钓鱼) is the Chinese term for “fishing” (or phishing), but also references the disputed Diaoyu/Senkaku Islands, hinting at the group’s geopolitical origins.+1
  • Tech Stack: They utilize a mix of custom malware (Diaoyu Loader, ShadowGuard rootkit) and open-source command-and-control (C2) frameworks like VShell and Cobalt Strike.

2. Victimology & Targeting

TGR-STA-1030 is not a financial crime group; their objective is purely intelligence gathering.

Key Sectors Targeted

  • Government Ministries: Finance, Foreign Affairs, Interior, and Trade.
  • Law Enforcement: National police forces and border control agencies.
  • Critical Infrastructure: National telecommunications providers and energy grids.

Geographic Focus

While global, the targeting is highly specific to current geopolitical events:

  • Southeast Asia: Heavy targeting of Thailand, Indonesia, and Vietnam (South China Sea claimants).
  • Latin America: Breaches confirmed in Brazil (Ministry of Mines & Energy) and Bolivia (Mining sector), likely stealing intelligence on rare earth mineral exports.
  • Europe: Reconnaissance against the Czech Republic (Military/Parliament) and Greece (Syzefxis Project).
  • Taiwan: Compromise of a major power equipment supplier.

3. Operational TTPs

Phase 1: Initial Access (The MEGA Phish)

  • Vector: Highly targeted spear-phishing emails posing as “Ministry Reorganization” or “Official Announcements.”
  • Delivery: Emails contain links to the legitimate file-hosting service MEGA (mega.nz).
  • Payload: Victims download a ZIP archive containing a legitimate-looking image (pic1.png) and the malicious executable (Diaoyu Loader).

Phase 2: Evasion & Execution

The Diaoyu Loader employs sophisticated anti-sandbox checks before executing:

  1. Resolution Check: It will only run if the screen resolution is greater than 1440 pixels wide (filtering out standard automated malware sandboxes).
  2. File Dependency: It checks for the presence of pic1.png in the same directory; if missing, it terminates.

Phase 3: Persistence & Lateral Movement

  • Malware Arsenal: Once inside, they deploy:
    • Cobalt Strike: For standard beaconing.
    • VShell: A Go-based C2 framework (increasingly preferred by this group).
    • ShadowGuard: A stealthy Linux rootkit that uses eBPF (Extended Berkeley Packet Filter) to hide processes deep within the OS kernel.
  • Web Shells: Extensive use of Behinder, Godzilla, and Neo-reGeorg on compromised IIS and NGINX servers to maintain access even if the main malware is detected.

4. Technical Intelligence & IoCs

Security teams should hunt for the following indicators immediately.

Indicators of Compromise (IoCs)

TypeValue/PatternContext
FilenameDiaoyu.exeOriginal internal filename of the loader
Filenamepic1.pngDecoy file required for execution
C2 ProtocolVShell / Go-based C2Traffic on ephemeral high TCP ports
RootkitShadowGuardLinux eBPF-based persistence
Hostingmega.nzSource of initial payload downloads
Web ShellsBehinder, GodzillaFound on public-facing web servers

Behavioral Hunting

  • Screen Resolution Checks: Monitor for processes querying GetSystemMetrics(SM_CXSCREEN) followed by immediate termination if the value is low.
  • eBPF Anomalies: On Linux systems, use tools like bpftool to list loaded programs. Look for unauthorized programs hooking into network or process events.

5. Strategic Recommendations

  1. Block Personal File Sharing: Restrict access to MEGA (mega.nz) and similar personal file-hosting sites on corporate/government networks, as this is the primary delivery vector.
  2. Linux Kernel Hardening: Ensure Secure Boot is enabled and restrict eBPF usage to privileged users only (sysctl kernel.unprivileged_bpf_disabled=1) to prevent ShadowGuard infections.
  3. Web Shell Hunting: Routinely scan public-facing web servers (IIS/Apache) for unmanaged scripts (ASPX/JSP/PHP). Tools like Neo-reGeorg leave distinct traffic patterns during tunneling—look for HTTP requests with high entropy in the body.

Monitor This Threat

TGR-STA-1030 is actively adapting. Their shift to Linux rootkits (ShadowGuard) indicates a move toward deep persistence in cloud and server environments. Organizations in trade, energy, and government sectors should consider themselves active targets.