Researchers uncover vast cyberespionage operation targeting dozens of governments worldwide
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,抓住主要信息。 文章讲的是一个来自亚洲的网络间谍组织,入侵了37个国家的政府系统,并对155个国家进行了侦察。这个组织的攻击范围非常广,涉及电信、警察、反恐等多个部门。他们主要通过钓鱼邮件和恶意软件进行攻击,还利用了零日漏洞工具包。攻击活动与全球政治事件有关联,比如委内瑞拉的情况。 接下来,我需要把这些信息浓缩到100字以内。要突出攻击范围、目标类型、攻击手段以及与事件的关联。同时,避免使用复杂的术语,保持简洁明了。 最后,检查一下字数是否符合要求,并确保信息准确无误。 </think> 一个来自亚洲的网络间谍组织入侵了37个国家的政府系统,并对155个国家进行了侦察。该组织利用钓鱼邮件和恶意软件攻击电信、警察、反恐等部门,并与全球政治事件相关联。 2026-2-5 14:31:20 Author: therecord.media(查看原文) 阅读量:2 收藏

A cyberespionage group based in Asia breached the systems of 37 governments and conducted reconnaissance in 155 countries, according to a new report from Palo Alto Networks. 

Pete Renals, director of National Security Programs for the comp Unit 42, declined to attribute the campaign to a specific country but said the attacks stood out because of how widespread they are.

“When we look at the scale here, we're making an argument that this is probably the most widespread and significant compromise of global government infrastructure by a state-sponsored group since SolarWinds,” Renals told Recorded Future News. 

Unit 42 tracked the compromise of at least 70 institutions across the 37 countries — with the hackers maintaining access to some victims for months. In one country, the hackers gained access to the parliament and a senior elected official. 

The group successfully breached national telecommunications companies, police agencies, counterterrorism departments and many ministries and departments of interior, foreign affairs, finance, trade, economy, immigration, mining, justice and energy.

The company said that while the campaign is largely focused on espionage and data theft, its “methods, targets and scale of operations are alarming, with potential long-term consequences for national security and key services.”

Renals compared the effort to recent Chinese campaigns like Volt Typhoon and Salt Typhoon but noted that both of those efforts were focused on specific industries within certain countries. 

Renals noted that several of the breaches came around newsworthy incidents, including a cyberattack on a Venezuelan institution following the U.S. operation that removed former President Nicolás Maduro.  

Screenshot 2026-02-04 at 4.48.09 PM.png

Image: Palo Alto

Diaoyu

Unit 42 researchers first discovered the campaign when it was investigating a series of phishing attacks that targeted European governments in early 2025. Further research led them to infrastructure that dates back to January 2024. 

The company determined the group behind the campaign was based in Asia due to regional tools, language settings, connections to operational infrastructure based in the region and activity that aligned with the time zone or events that would be of interest to the region. 

The string of phishing campaigns targeting European governments followed a similar pattern, with most involving malicious emails sent to government addresses. In one example, an Estonian official was targeted with an email that contained a zip file focused on police and border guards. 

Metadata shows the file was previously named “Diaoyu” — the Chinese word for fishing or phishing in a cybersecurity context. The malware performs a series of actions that ultimately result in the installation of a Cobalt Strike payload — which is typically used by hackers to gain a foothold in a victim’s system.

In addition to the phishing campaigns, Unit 42 found that the hackers used an array of tools, exploitation kits and proof-of-concept code for vulnerabilities in products used in many regions. 

Renals said they did not find any specific focus on software or hardware, with the hackers adapting to whatever the target environment was using. 

“The list has been variable, from an endpoint product standpoint, depending on who they're targeting — it may be more of a European flavor versus more of an African flavor versus more of an Asian flavor,” he said. 

Following the news

Unit 42 saw direct ties between certain attacks and current events. During the U.S. government shutdown in October 2025, the group shifted its scanning to organizations across North, Central and South American countries, including Brazil, Canada, Dominican Republic, Guatemala, Honduras, Jamaica, Mexico, Panama and Trinidad and Tobago. 

The hackers compromised the network of a Bolivian mining entity tied to rare earth minerals — a key issue in the country’s recent presidential election. The hackers also breached Brazil’s Ministry of Mines and Energy, which has the second largest supply of rare earth mineral reserves in the world.

One day after the U.S. captured Venezuela’s president in Operation Absolute Resolve, the hackers conducted extensive reconnaissance activities targeting at least 140 Venezuelan government-owned IP addresses. 

Dozens of other attacks aligned with regional hot-button issues. The hackers compromised European government agencies in Germany, Czechia, Cyprus, Greece as well as countries centered around the South China Sea, including Thailand and Vietnam. 

Renals said they have been successful over the last few weeks in pushing the actors out of a subset of impacted government networks. Their goal is to watch how the hackers respond and try to regain their access going forward.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

Martin Matishak

Martin Matishak

is the senior cybersecurity reporter for The Record. Prior to joining Recorded Future News in 2021, he spent more than five years at Politico, where he covered digital and national security developments across Capitol Hill, the Pentagon and the U.S. intelligence community. He previously was a reporter at The Hill, National Journal Group and Inside Washington Publishers.


文章来源: https://therecord.media/research-cyber-espionage-targeting-dozens-worldwide
如有侵权请联系:admin#unsafe.sh