LongNosedGoblin: The Cyber Sleuths Giving Southeast Asia the Sneezes!
LongNosedGoblin, the latest Chinese-backed APT, is turning cyber-espionage into an art form. These digital troublemakers use Group Policy as a malware dropper, much like a hacker’s version of a Trojan horse. With tools like NosyDoor and NosyHistorian, they snoop and swipe with a flair for the dramatic.

Hot Take:
When you hear “LongNosedGoblin,” you might think of a whimsical creature from a fantasy novel, but this is no bedtime story. Instead, it’s a new Chinese-backed APT group that’s causing quite a stir in the cyber realm. Think of them as cyber-espionage’s answer to a mischievous elf, only with more high-tech gadgets and less interest in shoes. Their unique use of Group Policy for malware deployment and their bespoke suite of tools make them the James Bond of the cyber-espionage world, if Bond were more interested in your browser history than in martinis.
Key Points:
- LongNosedGoblin is a new Chinese-backed APT group targeting Southeast Asian governments.
- The group utilizes custom C#/.NET applications and Group Policy as a malware deployment tool.
- NosyHistorian and NosyDoor are key malware tools used for reconnaissance and backdoor access.
- Newly identified tools include NosyStealer, NosyDownloader, and NosyLogger.
- Despite similarities, LongNosedGoblin is distinct from other known APT groups.
