Google’s Threat Intelligence Group has revealed that a China-linked hacking group—identified as UNC6384—carried out a sophisticated cyber-espionage campaign in March 2025 aimed at diplomats in Southeast Asia, using techniques such as captive-portal traps, adversary-in-the-middle tactics, and malware masquerading as legitimate updates. The malware, called “SOGU.SEC” (a variant of the PlugX backdoor), was digitally signed and installed directly into system memory to evade detection, enabling intruders to exfiltrate files, monitor activity, and maintain persistent access. Google responded by notifying affected parties, blocking malicious domains, revoking compromised certificates, and strengthening Safe Browsing protections. The campaign appears aligned with Chinese strategic interests in the region, underscoring the broader challenge posed by nation-state cyber threats to diplomatic and government institutions.
Sources: Epoch Times, Tech EDT, WCCF Tech
Key Takeaways
– Google countered the cyber-espionage effort by alerting involved diplomatic entities, blocking domains, revoking malicious certificates, and updating Safe Browsing to guard against similar future attacks.
– The SOGU.SEC malware, a stealthy PlugX backdoor variant, was digitally signed and executed in memory, allowing hackers to bypass standard security tools and quietly compromise systems.
– The campaign’s targeting of diplomats coincides with broader geopolitical tensions, reinforcing concerns that state-aligned cyber activity is increasingly being used to gain intel and exert influence in Southeast Asia.
In-Depth
Google’s recent alert about this China-linked hacking operation targeting Southeast Asian diplomats should raise some serious eyebrows. In March of this year, UNC6384—a cyber group tied to Chinese state interests—emerged as a particularly crafty threat. Using tactics like fake Wi-Fi login screens, they lured officials into installing what looked like legitimate software updates. Instead, victims downloaded a digitally signed malware called SOGU.SEC, a stealthy PlugX backdoor that runs quietly in system memory, avoiding most traditional defenses.
Once installed, attackers could sift through sensitive files, survey networks, and control devices remotely—all while flying under the radar. Google didn’t just sound the alarm; they took real steps: alerting the affected diplomats, revoking the digital certificates, blocking hostile domains, and upgrading their Safe Browsing shields. It’s a textbook response—quick, targeted, and practical.
What stands out is the strategic precision of the campaign. Diplomats aren’t random targets—they’re walking archives of international coordination and delicate negotiations. That someone would go to these lengths to intercept such data reflects rising stakes in cyber-diplomacy. In a world where influence can be seized byte by byte, this incident underscores the pressing need for vigilance and coordinated defense—especially among diplomatic corps.
It’s a reminder that no one should assume immunity just because they’re behind government-issued credentials.

