Asia-Based Cyber Group TGR-STA-1030 Hits 70 Global Government Entities in Massive Espionage Campaign
February 5, 2026
A state-aligned cyber group based in Asia, tracked as TGR-STA-1030, has compromised at least 70 government and critical infrastructure organizations across 37 countries in an ongoing espionage campaign, with access maintained for months in some cases.
The targets span five national law enforcement or border control agencies, three ministries of finance, a national parliament, and a senior elected official, illustrating high-value governmental focus.
Over the past year, the operation has compromised 70 entities and conducted active reconnaissance against government infrastructure in 155 countries, with activity peaking in late 2025.
Global targeting shows a regional emphasis on the Americas, Europe, and Asia-Pacific, with inferred motives tied to economic and political events such as mining, trade, and geopolitical shifts.
Initial access mainly comes from sophisticated phishing delivering a malware loader that specifically checks for five security products to avoid detection.
Exploitation focuses on known vulnerabilities across SAP, Spring, Microsoft Exchange, Windows, and web apps, without zero-days, with occasional remote code execution via CVEs.
The operation appears to align with geopolitical timing, potentially linked to diplomatic missions, trade talks, political unrest, and military actions.
A multi-tier C2 infrastructure shifts from Cobalt Strike to VShell, and uses web shells (Behinder, Neo-reGeorg, Godzilla) for persistent access and lateral movement.
Domain activity includes gouvn.me, dog3rj.tech, and zamstats.me, with notable targeting of Francophone and European governments; a late-2024 incident involved copying an X.509 certificate to a Tencent server for four days.
There are ongoing efforts to push actors out of networks, with monitoring of attacker responses and attempts to regain access.
The attackers pursue a focused, non-random approach, limiting scans to government infrastructure and specific targets per country to support long-term intelligence gathering.
ShadowGuard, a Linux kernel rootkit based on eBPF, enables kernel-level stealth to conceal processes/files and monitor for security products, supporting persistence.
Summary based on 7 sources
Get a daily email with more Tech stories
Sources

The Register • Feb 5, 2026
Asia-based government spies quietly broke into critical networks across 37 countries
ST • Feb 5, 2026
Hackers hit sensitive targets in 37 nations in vast spying plot
The Mercury News • Feb 5, 2026
Asian hackers hit sensitive targets in 37 nations in spying plot
SecurityWeek • Feb 5, 2026
Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries