Palo Alto Networks Unit 42 has published a new report about large-scale cyber espionage activities, called the Shadow Campaigns.
The research shows that a state-linked threat group has been active for more than a year and has targeted government and critical infrastructure organizations in many countries around the world.
Key points from the report:
- Organizations in dozens of countries were affected.
- Targets included government agencies, border control, law enforcement, and finance departments.
- Attackers often used phishing emails and known system weaknesses to get access.
- The activity shows long-term spying, not quick attacks.
This report is a strong reminder that cyber espionage is real and ongoing. Even well-protected organizations can be targets, which makes awareness and good security practices more important than ever.
Keynotes:
"This investigation unveils a new cyberespionage group that Unit 42 tracks as TGR-STA-1030. We refer to the group’s activity as the Shadow Campaigns. We assess with high confidence that TGR-STA-1030 is a state-aligned group that operates out of Asia. Over the past year, this group has compromised government and critical infrastructure organizations across 37 countries. This means that approximately one out of every five countries has experienced a critical breach from this group in the past year. Further, between November and December 2025, we observed the group conducting active reconnaissance against government infrastructure associated with 155 countries."
"In addition to phishing campaigns, the group often couples exploitation attempts with their reconnaissance activities to gain initial access to target networks. To date, we have not observed the group developing, testing or deploying any zero-day exploits. However, we assess that the group is comfortable testing and deploying a wide range of common tools, exploitation kits and proof-of-concept code for N-day exploits."
"We assess that the group relies heavily on a mix of command-and–control (C2) frameworks and tools common to the actors’ region to move laterally and maintain persistent access within compromised environments."
"The group’s reconnaissance efforts shed light on its global interests. We have also observed the group's success at compromising several government and critical infrastructure organizations globally. We assess that over the past year, the group compromised at least 70 organizations across 37 countries,..."




