A previously unknown state-aligned cyberespionage group has quietly compromised government and critical infrastructure organizations across 37 countries, according to a new investigation by Palo Alto Networks’ Unit 42.
Tracked as TGR-STA-1030, the group – behind what researchers call the “Shadow Campaigns” – has spent at least two years infiltrating ministries, law enforcement agencies, border authorities, energy regulators, and national telecommunications providers worldwide.
What makes this campaign alarming isn’t just its scale but its intent. This is not cybercrime for profit. This is strategic intelligence collection, tightly aligned with geopolitical and economic interests.
Who Is Behind the Shadow Campaigns?
Unit 42 assesses with high confidence that TGR-STA-1030 is a state-aligned actor operating out of Asia, based on:
- Language and tooling preferences
- Infrastructure and operational timing aligned with GMT+8
- Regional services and upstream network links
- Target selection mirroring real-world diplomatic and economic events
The group was first detected in early 2025 during phishing campaigns targeting European governments, but forensic evidence shows activity dating back to January 2024.
How the Attacks Work: Simple Lures, Advanced Persistence
Phishing as the Entry Point
The campaign began with highly tailored phishing emails sent to government officials, often disguised as internal ministry reorganization notices. Victims were directed to malicious archives hosted on legitimate platforms like Mega.nz.
Once opened, victims unknowingly executed a loader known as Diaoyu Loader a stealthy malware designed to evade sandbox analysis and endpoint defenses.
From Phish to Full Compromise
After initial access, attackers escalated privileges using known (N-day) vulnerabilities, not zero-days targeting systems such as:
- Microsoft Exchange
- SAP
- D-Link
- Atlassian Crowd
- Various government HR and email platforms
The endgame: long-term persistence, lateral movement, and intelligence exfiltration.
A New Level of Stealth: ShadowGuard Rootkit
One of the most concerning discoveries is ShadowGuard, a custom Linux eBPF kernel rootkit used exclusively by this group.
Unlike traditional malware, ShadowGuard operates inside the kernel, allowing attackers to:
- Hide processes and files
- Manipulate audit logs
- Remain invisible to standard detection tools
This places Shadow Campaigns among the most technically advanced espionage operations observed in recent years.
Who Is Being Targeted and Why?
Victims span 155 countries, but compromises are highly selective. Targets align with:
- Foreign affairs and diplomacy
- Trade and economic negotiations
- Natural resources and mining
- Energy and telecommunications
- Law enforcement and border control
This is cyberespionage driven by geopolitics, not opportunism.
Why This Matters to Organizations and Governments
For governments, this represents a direct erosion of sovereignty.
For industries tied to national strategy – energy, mining, telecom – it’s a warning that commercial systems are intelligence targets.
For defenders, it reinforces a hard truth:
Nation-state attackers don’t need zero-days when exposed systems, weak credentials, and delayed patching still exist.
Organizations relying on outdated controls must urgently reassess their posture with partners like Saintynet Cybersecurity, especially in governance, detection, and response.
10 Defensive Actions Security Teams Should Take Now
- Conduct threat-led risk assessments across government and critical systems
- Harden email gateways against spear-phishing
- Monitor for long-dwell intrusions, not just alerts
- Audit Linux systems for kernel-level anomalies
- Patch exposed services aggressively
- Implement zero-trust access controls
- Restrict administrative privileges
- Share intelligence across sectors
- Test detection against Cobalt Strike, Sliver, and web shells
- Invest in training and awareness programs
Conclusion: Espionage Has Gone Industrial
The Shadow Campaigns show how modern cyberespionage has become systematic, scalable, and deeply strategic.
This is not noise. This is reconnaissance for the future.
And governments, enterprises, and security leaders must respond accordingly.




