top of page

LongNosedGoblin: Pulling Malware Strings Through Group Policy

  • Foto del escritor: Javier  Conejo del Cerro
    Javier Conejo del Cerro
  • 19 dic 2025
  • 3 Min. de lectura

Every enterprise network has trusted mechanisms that operate quietly in the background. They apply updates, enforce settings, and keep systems aligned without drawing attention.

Windows Group Policy is one of those mechanisms — and LongNosedGoblin knew exactly how to turn it against its owners.

Active since at least September 2023, this China-aligned advanced persistent threat has demonstrated a refined understanding of enterprise Windows environments. Instead of relying on noisy exploits or obvious malware delivery, LongNosedGoblin abused one of the most trusted components of Active Directory to distribute implants, move laterally, and remain hidden inside government networks across Southeast Asia and Japan.

This is a campaign about control, patience, and turning policy into payload.


Phase 1: The Quiet Intruder — Establishing a Foothold


LongNosedGoblin’s operations focus on government environments, where Windows domains and centralized policy management are the norm.

The initial access vector has not been publicly detailed, but once inside the environment, the attackers demonstrate deep familiarity with:

  • Active Directory internals

  • Domain-wide policy deployment

  • Trusted Windows binaries and execution paths

Rather than immediately deploying backdoors across endpoints, the group prioritizes stealth and positioning, preparing the ground for wide, coordinated execution.

The goblin does not rush. It waits.


Phase 2: Trust as a Weapon — Abusing Group Policy


The defining tactic of LongNosedGoblin is its abuse of Windows Group Policy for malware distribution.

After compromising Active Directory, the attackers:

  • Modify Group Policy Objects (GPOs)

  • Disguise malicious payloads as legitimate policy files

  • Place them inside Group Policy cache directories

Examples include files masquerading as:

  • History.ini

  • Registry.pol

Because Group Policy updates are:

  • Automatically applied

  • Trusted by design

  • Executed without user interaction

…the malware propagates silently to multiple machines at once, bypassing traditional perimeter defenses and user-focused security controls.

At this point, the goblin is pulling strings across the network.


Phase 3: Reconnaissance First — NosyHistorian


Before escalating further, LongNosedGoblin prioritizes intelligence gathering.

One of the deployed tools, NosyHistorian, focuses on:

  • Harvesting browser history

  • Identifying visited internal and external resources

  • Mapping user behavior and interests

This information allows the attackers to:

  • Identify high-value users

  • Locate sensitive internal systems

  • Decide where deeper persistence or secondary payloads are justified

Rather than blindly infecting everything, the group is selective.

This is espionage, not smash-and-grab.


Phase 4: The Backdoor — NosyDoor Takes Over


Once suitable targets are identified, the attackers deploy their primary backdoor: NosyDoor.

NosyDoor is delivered through a multi-stage execution chain designed to blend in with legitimate system activity and evade detection.

Key elements of the chain include:

  • A dropper that decrypts embedded payloads using DES encryption

  • Execution guardrails to ensure the malware runs only on intended victims

  • Persistence via scheduled tasks

  • Abuse of the legitimate Windows binary UevAppMonitor.exe, copied from System32

The goblin hides behind trusted masks.


Phase 5: Living off the Land — AppDomainManager Injection


The core evasion technique used by NosyDoor relies on AppDomainManager injection.

The attackers:

  • Modify the configuration file of UevAppMonitor.exe

  • Specify a custom AppDomainManager

  • Force the application to load a malicious DLL (SharedReg.dll)

This DLL:

  • Bypasses the Antimalware Scan Interface (AMSI)

  • Decrypts and loads the final NosyDoor payload in memory

By abusing .NET runtime behavior rather than exploiting vulnerabilities, the malware remains invisible to many traditional detection mechanisms.

This is not brute force. It is craftsmanship.


Phase 6: Cloud as Cover — OneDrive Command and Control


For command-and-control, LongNosedGoblin blends malicious traffic into legitimate cloud usage.

NosyDoor:

  • Communicates with Microsoft OneDrive

  • Uses RSA-encrypted metadata to exchange commands

  • Retrieves task files stored within cloud infrastructure

By leveraging a trusted cloud service:

  • Network traffic appears benign

  • Blocking becomes operationally difficult

  • Attribution and detection are delayed

The goblin no longer needs its own lair. It hides in the cloud.


Phase 7: Persistence and Scale


The combined use of:

  • Active Directory compromise

  • Group Policy abuse

  • Living-off-the-land binaries

  • Cloud-based C2

…allows LongNosedGoblin to:

  • Maintain long-term access

  • Scale deployment across multiple endpoints

  • Survive routine system maintenance

This is a professionalized espionage operation, optimized for endurance rather than speed.


Defensive Measures: Cutting the Strings


Defending against attacks like LongNosedGoblin requires focusing on trust boundaries, not just malware signatures.

Effective countermeasures include:

  • Hardening Active Directory and limiting GPO modification rights

  • Monitoring Group Policy changes and cache directories

  • Auditing scheduled tasks and .NET configuration files

  • Restricting abuse of living-off-the-land binaries

  • Inspecting cloud services like OneDrive for anomalous command patterns

If Group Policy is trusted blindly, it becomes the perfect delivery system.

LongNosedGoblin demonstrates how modern APTs no longer need exploits to move freely inside networks. They only need privilege, patience, and trust.

By turning Group Policy into a malware distribution channel, this threat actor inverted one of Windows’ most powerful defensive mechanisms. The lesson is clear and uncomfortable:

Anything trusted at scale can be weaponized at scale.

In the hands of a careful adversary, even policy becomes a string — and someone else is holding it.



Cybersecurity News


 
 
 

Comentarios


bottom of page