The hacker group UTG-Q-015, first recognized in December 2024 for mounting assaults on main web sites like CSDN, has escalated its malicious actions, concentrating on authorities and enterprise net servers with unprecedented aggression.
Initially disclosed for his or her techniques of web site manipulation, the group has since pivoted to exploiting 0day and Nday vulnerabilities, launching widespread brute-force scanning and blasting campaigns as early as March 2025.
Brute-Power Assaults on Authorities Net Servers
This Southeast Asia-based risk actor, recognized for offering penetration and intelligence providers, has demonstrated adaptability by altering techniques post-exposure, specializing in high-value targets akin to blockchain platforms, monetary establishments, and AI analysis servers.
UTG-Q-015’s operations took a menacing flip in March 2025 once they deployed a community of scanning nodes to execute brute-force assaults on publicly accessible authorities and enterprise net servers.

After efficiently compromising techniques, the group deployed Cobalt Strike backdoors and manipulated nps tunnels for persistence, utilizing instruments like fscan for lateral motion with harvested credentials.
Brute-Power to Subtle Exploits
By April, their arsenal expanded to incorporate Nday exploits akin to CVE-2021-38647, CVE-2017-12611, and CVE-2017-9805, showcasing their rising technical sophistication.
Their April marketing campaign additionally noticed a focused “puddle mounting” operation in opposition to blockchain-related web sites, digital signature backends, Bitcoin techniques, and GitLab interfaces, impacting quite a few authorities and enterprise shoppers.
Victims had been lured into downloading malicious payloads from domains like hxxps://updategoogls.cc/instruments.exe, usually through phishing pages embedded with misleading JavaScript code on compromised Web3 and blockchain venture websites.
Past these sectors, UTG-Q-015 has infiltrated monetary establishments utilizing a multi-stage assault chain.
Beginning with unknown net vulnerabilities to compromise border servers, they employed IM phishing to ship bait recordsdata like “confidential XXXX.exe” to inner personnel, finally fetching a third-stage payload through intranet-linked C2 servers.

Their attain extends to Linux-based AI platforms as properly, exploiting vulnerabilities like CVE-2023-48022 and unauthorized flaws in ComfyUI-Supervisor plugins to load backdoors akin to Vshell, concentrating on AI analysis servers for espionage.
Based on the Report, this persistent give attention to AI infrastructure in 2025, particularly by way of offshore APT collaborations, underscores the strategic intent behind their operations, posing a extreme threat to инновация-critical sectors.
The narrative of Chinese language-speaking attackers, usually generalized as “CN-Nexus” by worldwide companions, oversimplifies a fancy ecosystem spanning East and Southeast Asia.
UTG-Q-015, whereas knowledgeable outfit, operates in a tense panorama of ideological and political conflicts, usually clashing with regional outsourcing teams like Operation EviLoong and Operation Big.
Their retaliatory assaults on home programming boards in 2024 replicate deeper rivalries masked as “outsourcing wars.”
To counter such threats, options like cloud-based risk detection and ASRock’s functionality to neutralize UTG-Q-015’s weaponry are strongly beneficial for presidency and enterprise shoppers.
Moreover, platforms from Qi’anxin, together with SkyRock, SkyEye, and NGSOC, present sturdy detection in opposition to these subtle incursions.
IOC Desk
Indicator Sort | Worth |
---|---|
FileHash-MD5 | c313868c3e3e470fc7dde07ebaac0a87 |
FileHash-MD5 | fb68d6affca239ba4f9315889fcf6d61 |
FileHash-MD5 | e9ab0bc9d47c84285b82b25834aeae03 |
FileHash-MD5 | 53a83040fea6dbe2845747d69da6504e |
FileHash-MD5 | e89a6d6a0ca026317456594211ccb007 |
C2 Area/IP | updategoogls.cc |
C2 Area | safe-controls.oss-cn-hongkong.aliyuncs.com |
C2 IP | 209.250.254.130:13389 |
Discover this Information Attention-grabbing! Comply with us on Google Information, LinkedIn, & X to Get Instantaneous Updates!