A prolific and sophisticated state-aligned cyberespionage group, tracked as TGR-STA-1030 (also known as UNC6619 by Mandiant), has been attributed to a massive global intrusion campaign impacting government and critical infrastructure sectors in at least 37 countries. The operation, named the "Shadow Campaign" by researchers at Palo Alto Networks Unit 42, has infiltrated a minimum of 70 organizations over the past year, with reconnaissance activities spanning 155 countries between November and December 2025.
While formal attribution is pending, operational characteristics—including the use of regional tooling, language preferences, activity hours corresponding to the GMT+8 time zone, and upstream infrastructure connections—strongly suggest alignment with the People's Republic of China. The campaign's primary objective is intelligence gathering, targeting sensitive data related to military, law enforcement, diplomatic, and economic affairs. The scale of the operation and the strategic nature of the targets indicate a well-resourced, persistent threat with significant long-term implications for international security and economic stability.
The "Shadow Campaign" represents a large-scale, coordinated cyberespionage effort focused on long-term intelligence collection. Unit 42 first identified TGR-STA-1030 in early 2025 while investigating malicious phishing campaigns targeting European governments. Infrastructure dating back to January 2024 suggests the group has been active for at least two years.
The threat actors have demonstrated a deep understanding of geopolitical events, timing their attacks to coincide with sensitive negotiations, ministerial meetings, and international operations. For instance, attacks on Indonesian and Mexican entities aligned with trade negotiations, while intrusions in Venezuela intensified following the U.S. Operation Absolute Resolve in January 2026.
The group has successfully compromised:
Phishing Campaigns
TGR-STA-1030 employs sophisticated phishing campaigns with lures relevant to target organizations. In February 2025, Unit 42 investigated campaigns targeting European governments with emails about ministry reorganizations, containing links to malicious archives hosted on mega[.]nz.
Diaoyu Loader
The group developed a custom malware loader called "Diaoyu" (translating to "fishing/phishing"). This sophisticated tool employs multiple evasion techniques:
N-Day Exploitation
The group routinely exploits known vulnerabilities in public-facing applications. Over the past year, Advanced Threat Prevention services detected exploitation attempts including:
T1566 - Phishing: Carefully crafted lures relevant to target activitiesT1190 - Exploit Public-Facing Application: Exploitation of known security flawsT1547 - Boot or Logon Autostart Execution: Long-term persistence mechanismsT1071 - Application Layer Protocol: HTTP/HTTPS for C2 communicationsT1560 - Archive Collected Data: Data staging for exfiltrationT1041 - Exfiltration Over C2 Channel: Exfiltration of sensitive dataT1589 - Gather Victim Identity Information: Extensive reconnaissanceT1078 - Valid Accounts: Persistence and lateral movementVShell (Primary C2)
Additional C2 Frameworks
The group frequently deploys web shells on both external-facing and internal web servers:
Unit 42 discovered a new, unique Linux kernel rootkit used exclusively by TGR-STA-1030. ShadowGuard is an Extended Berkeley Packet Filter (eBPF) rootkit with advanced stealth capabilities:
Capabilities:
Detection Challenges:
Usage Commands:
kill -900 [PID] # Add PID to allow list
kill -901 [PID] # Remove PID from allow list
Victim-Facing (C2 Servers)
Relay Infrastructure
Proxies
Upstream (Operator Infrastructure)
The group registers domains with specific TLDs: .me, .live, .help, .tech
Notable Domains:
Rare Earth Minerals Intelligence:
Trade Negotiations:
Law Enforcement & Border Control:
Government Administration:
Critical Infrastructure:
138.197.44[.]208
142.91.105[.]172
146.190.152[.]219
157.230.34[.]45
157.245.194[.]54
159.65.156[.]200
159.203.164[.]101
178.128.60[.]22
178.128.109[.]37
188.127.251[.]171
188.166.210[.]146
208.85.21[.]30
abwxjp5[.]me
brackusi0n[.]live
dog3rj[.]tech
emezonhe[.]me
gouvn[.]me
msonline[.]help
pickupweb[.]me
pr0fu5a[.]me
q74vn[.]live
servgate[.]me
zamstats[.]me
zrheblirsy[.]me
Diaoyu Loader / Phishing:
66ec547b97072828534d43022d766e06c17fc1cafe47fbd9d1ffc22e2d52a9c023ee251df3f9c46661b33061035e9f6291894ebe070497ff9365d6ef2966f7feCobalt Strike Beacons:
5175b1720fe3bc568f7857b72b960260ad3982f41366ce3372c04424396df6fe358ca77ccc4a979ed3337aad3a8ff7228da8246eebc69e64189f930b325daf6a293821e049387d48397454d39233a5a67d0ae06d59b7e5474e8ae557b0fc5b06c876e6c074333d700adf6b4397d9303860de17b01baa27c0fa5135e2692d3d6fb2a6c8382ec37ef15637578c6695cb35138ceab42ce4629b025fa4f04015eaf25ddeff4028ec407ffdaa6c503dd4f82fa294799d284b986e1f4181f49d18c9f3182a427cc9ec22ed22438126a48f1a6cd84bf90fddb6517973bcb0bac58c4231ShadowGuard Rootkit:
7808b1e01ea790548b472026ac783c73a033bb90bbe548bf3006abfbcb48c52dCVE-2019-11580 Exploit:
9ed487498235f289a960a5cc794fa0ad0f9ef5c074860fea650e88c525da0ab4Defending against a sophisticated actor like TGR-STA-1030 requires a mature security program with proactive threat hunting capabilities.
Assume Breach Mentality: Given the scale of this campaign, organizations in the targeted sectors (government, critical infrastructure) should assume they are being targeted and proactively hunt for signs of compromise.
Network Traffic Analysis: Implement D3-NTA: Network Traffic Analysis to baseline normal traffic patterns for critical assets. Monitor for large or unusual data transfers, especially to geolocations inconsistent with business operations. Pay close attention to traffic during GMT+8 working hours. Look for connections to ephemeral 5-digit TCP ports with ordered numbers (VShell characteristic).
Endpoint Detection and Response (EDR): Deploy EDR solutions to monitor for suspicious process execution (PowerShell invoked by office applications, archiving utilities). Hunt for web shell indicators (Behinder, Neo-reGeorg, Godzilla). Look for eBPF programs and anomalous kernel-level activity indicative of ShadowGuard rootkit.
Log Monitoring & Correlation: Ingest and analyze logs from public-facing applications, VPNs, and email gateways. Correlate login events with geographic data to identify access from unexpected regions. Use D3-DAM: Domain Account Monitoring for anomalous privileged account use. Alert on creation of files/directories beginning with "swsecret".
Threat Intelligence Integration: Actively consume and operationalize threat intelligence related to TGR-STA-1030. Use IOCs to hunt in logs and create detection rules. This is a form of D3-FCR: File Content Rules and hash-based detection.
Threat Hunting: Proactively hunt for evidence of N-day exploitation on internet-facing systems. Search for web shell activity and signs of lateral movement from perimeter devices. Conduct regular IOC sweeps using indicators provided by Unit 42 and industry partners. Investigate any connections to/from AS 9808 IP space.
Patch Management: Aggressively patch known vulnerabilities in all internet-facing systems, prioritizing CVEs exploited by this group. This corresponds to MITRE mitigation M1051 - Update Software.
Security Awareness Training: Since phishing is a primary vector, implement continuous user training (M1017 - User Training) to help employees recognize and report suspicious emails, especially those with links to file-sharing services like mega[.]nz.
Network Segmentation: Implement M1030 - Network Segmentation to limit lateral movement. Isolate critical systems from the general corporate network and restrict communication paths between segments. This aligns with D3-NI: Network Isolation.
Multi-Factor Authentication (MFA): Enforce MFA (M1032 - Multi-factor Authentication) on all external access points, including VPNs and cloud services, to protect against credential theft. Prioritize phishing-resistant MFA like FIDO2.
Egress Filtering: Implement strict outbound traffic filtering (D3-OTF: Outbound Traffic Filtering) to block connections to known malicious infrastructure and restrict exfiltration channels. Only allow traffic to required destinations on necessary ports.
eBPF Monitoring: Implement monitoring for eBPF program loading and kernel-level anomalies to detect ShadowGuard rootkit activity. Alert on unusual kernel module activity and syscall interceptions.
File Integrity Monitoring: Alert on unauthorized changes to system binaries and configurations. Monitor for files/directories with names beginning with "swsecret".
Attack Surface Reduction: Reduce the external attack surface by disabling unnecessary services and enforcing strong access controls on all internet-facing systems.
Implement strict network segmentation to contain breaches and prevent lateral movement from less sensitive to more critical systems.
Mapped D3FEND Techniques:
Analyze and restrict egress network traffic to detect and block data exfiltration and C2 communications.
Mapped D3FEND Techniques:
Enforce MFA across all services, especially for remote access, to protect against credential compromise.
Mapped D3FEND Techniques:
Maintain a rigorous patch management program to close vulnerabilities in public-facing applications.
Mapped D3FEND Techniques:
Implement Network Traffic Analysis to baseline normal traffic patterns for critical assets. Monitor for large or unusual data transfers, especially to geolocations inconsistent with business operations. Pay close attention to traffic during GMT+8 working hours. Look for connections to ephemeral 5-digit TCP ports with ordered numbers (VShell characteristic).
Implement Network Segmentation to limit lateral movement. Isolate critical systems from the general corporate network and restrict communication paths between segments. This prevents attackers from pivoting from compromised perimeter devices to high-value internal systems.
Implement strict outbound traffic filtering to block connections to known malicious infrastructure and restrict exfiltration channels. Only allow traffic to required destinations on necessary ports. Monitor for connections to AS 9808 IP space and ephemeral high-numbered ports.
Actively consume and operationalize threat intelligence related to TGR-STA-1030. Use IOCs (IP addresses, domains, file hashes) to hunt in logs and create detection rules. Conduct regular IOC sweeps using indicators provided by Unit 42.
Monitor domain accounts for anomalous privileged account use. Correlate login events with geographic data to identify access from unexpected regions. Alert on creation of files/directories beginning with 'swsecret' (ShadowGuard rootkit indicator).

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats