Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Unpacking threat clusters: A deep dive into cybersecurity attacks on a Southeast Asian government

Mar 27, 2026 | Threat Intelligence Research

Espionage Campaign Targeting Southeast Asian Government Uncovered

A series of cyberespionage campaigns targeting a government organization in Southeast Asia has been identified by researchers at Unit 42. The campaigns, attributed to identified clusters including Stately Taurus and two others designated as CL-STA-1048 and CL-STA-1049, utilized advanced malware techniques to establish persistent network access.

The investigation revealed that the attackers employed a USB-propagated malware known as USBFect, which deploys the PUBLOAD backdoor to gain access. The CL-STA-1048 cluster utilized a sophisticated toolkit, including multiple remote access Trojans (RATs) such as Masol and EggStremeFuel, while CL-STA-1049 introduced a novel loader, the Hypnosis loader, to deliver FluffyGh0st RAT. The overlap in tactics and infrastructure suggests a coordinated effort among China-aligned threat groups, aiming for long-term infiltration of critical government networks.

The visual aid provided illustrates the relationships between the various activity clusters and the malware utilized in these operations. This diagram highlights the complexity and interconnectivity of the methodologies employed by the attackers, stressing the coordinated nature of the threat.

Defensive Context

In real-world environments, this type of cyber activity poses a significant risk, particularly for government entities and similar organizations with sensitive data. Agencies in Southeast Asia may need to prioritize monitoring for the specific malware and tools outlined due to their targeted nature, while private sectors with government contracts or associations should also be aware of the associated risks.

Organizations with USB access points should be notably vigilant, given the propagation method of USBFect, which demonstrates how physical devices can be vectors for cyber attacks. Additionally, persistent defense mechanisms would be crucial in responding to such multifaceted threats.

Why This Matters

Organizations with high-value targets, especially those aligned with Southeast Asian governments, are at substantial risk. The appearance of multiple distinct clusters suggests an orchestrated approach, where threat actors are potentially collaborating to exploit governmental vulnerabilities. Immediate emphasis on monitoring and detection is crucial, as the sophisticated nature of the malware indicates a high level of planning and resource allocation from the attackers.

Defender Considerations

Defensive measures should focus on identifying and blocking the specific malware families and loaders associated with this activity. Particularly, attention should be paid to network traffic patterns that may indicate the use of RATs like FluffyGh0st or Masol. Monitoring for the file hashes and malicious domains identified in this research could provide additional layers of defense.

Indicators of Compromise (IOCs)

SHA256 Hashes

  • 4b29b74798a4e6538f2ba245c57be82953383dc91fe0a91b984b903d12043e92
  • 05995284b59ad0066350f43517382228f7eee63cd297e787b2a271f69ecf2dfc
  • Additional hashes related to other components

Domains

  • webmail.rpcthai.com
  • webmail.homesmountain.com
  • and other noted domains

IPv4 Addresses

  • 103.15.29.17
  • 103.131.95.107
  • 120.89.46.135

This analysis emphasizes the critical nature of continued vigilance against sophisticated cyber threats and the need for specialized defenses in targeted sectors.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles