Unpacking threat clusters: A deep dive into cybersecurity attacks on a Southeast Asian government

Mar 27, 2026 | Threat Intelligence Research

Espionage Campaign Targeting Southeast Asian Government Uncovered

A series of cyberespionage campaigns targeting a government organization in Southeast Asia has been identified by researchers at Unit 42. The campaigns, attributed to identified clusters including Stately Taurus and two others designated as CL-STA-1048 and CL-STA-1049, utilized advanced malware techniques to establish persistent network access.

The investigation revealed that the attackers employed a USB-propagated malware known as USBFect, which deploys the PUBLOAD backdoor to gain access. The CL-STA-1048 cluster utilized a sophisticated toolkit, including multiple remote access Trojans (RATs) such as Masol and EggStremeFuel, while CL-STA-1049 introduced a novel loader, the Hypnosis loader, to deliver FluffyGh0st RAT. The overlap in tactics and infrastructure suggests a coordinated effort among China-aligned threat groups, aiming for long-term infiltration of critical government networks.

The visual aid provided illustrates the relationships between the various activity clusters and the malware utilized in these operations. This diagram highlights the complexity and interconnectivity of the methodologies employed by the attackers, stressing the coordinated nature of the threat.

Defensive Context

In real-world environments, this type of cyber activity poses a significant risk, particularly for government entities and similar organizations with sensitive data. Agencies in Southeast Asia may need to prioritize monitoring for the specific malware and tools outlined due to their targeted nature, while private sectors with government contracts or associations should also be aware of the associated risks.

Organizations with USB access points should be notably vigilant, given the propagation method of USBFect, which demonstrates how physical devices can be vectors for cyber attacks. Additionally, persistent defense mechanisms would be crucial in responding to such multifaceted threats.

Why This Matters

Organizations with high-value targets, especially those aligned with Southeast Asian governments, are at substantial risk. The appearance of multiple distinct clusters suggests an orchestrated approach, where threat actors are potentially collaborating to exploit governmental vulnerabilities. Immediate emphasis on monitoring and detection is crucial, as the sophisticated nature of the malware indicates a high level of planning and resource allocation from the attackers.

Defender Considerations

Defensive measures should focus on identifying and blocking the specific malware families and loaders associated with this activity. Particularly, attention should be paid to network traffic patterns that may indicate the use of RATs like FluffyGh0st or Masol. Monitoring for the file hashes and malicious domains identified in this research could provide additional layers of defense.

Indicators of Compromise (IOCs)

SHA256 Hashes

  • 4b29b74798a4e6538f2ba245c57be82953383dc91fe0a91b984b903d12043e92
  • 05995284b59ad0066350f43517382228f7eee63cd297e787b2a271f69ecf2dfc
  • Additional hashes related to other components

Domains

  • webmail.rpcthai.com
  • webmail.homesmountain.com
  • and other noted domains

IPv4 Addresses

  • 103.15.29.17
  • 103.131.95.107
  • 120.89.46.135

This analysis emphasizes the critical nature of continued vigilance against sophisticated cyber threats and the need for specialized defenses in targeted sectors.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles