Today, organizations around the world are facing a new wave of such, more sophisticated, spear-phishing campaigns, which have been linked to a China-aligned threat actor UTA0388. This cabal has been hunting artists and arts organizations like predators in North America, Asia and Europe. These campaigns target to deploy a Go-based implant dubbed GOVERSHELL. It adds a bunch of nefarious variants tailor-made for espionage capers.
The UTA0388 campaigns use advanced tactics to tempt victims into clicking harmful links. Phishing emails distributed by the threat actor instruct targets to a fake Cloudflare CAPTCHA verification page. Once on this page, victims are instructed to download a ZIP archive which includes an LNK (Windows shortcut) file. This RTF file triggers an embedded PowerShell script that opens a decoy document. Simultaneously, it quietly deploys the PlugX malware through DLL side-loading.
Targeted Campaigns Across Continents
Since launching operations, UTA0388 has systematically focused on targeting designated regions, such as North America, Asia, and Europe. With each well-designed campaign so specifically geared towards their target victims, sources say that the first few phishing messages can seem very credible, claiming to be from senior researchers and analysts from non-existent companies.
“The initially observed campaigns were tailored to the targets, and the messages purported to be sent by senior researchers and analysts from legitimate-sounding, completely fabricated organizations.” – Volexity
This level of personalization suggests that UTA0388 likely employs advanced automation tools or language models to generate phishing emails with minimal human oversight. With this level of automation they’re able to raise the productivity of their operations. It also increases the scope at which they’re able to carry out these attacks.
The GOVERSHELL Malware Family
GOVERSHELL isn’t the new coolest malware to watch out for, but a family of five different variants of cross-platform, open-source malware. Collectively, these variants have been discovered under names HealthKick, TE32, TE64, WebSocket and Beacon, with differing capabilities and characteristics.
HealthKick, which was originally discovered back in April of 2025, could let attackers run commands through cmd.exe. Hot on the heels, TE32 was released in June 2025, with the ability to execute commands straight through a PowerShell reverse shell. TE64 first appeared in early July 2025, and is capable of running both native and dynamic commands through PowerShell.
By mid-July 2025, WebSocket had its capabilities listed on Censys that it could execute PowerShell commands with powershell.exe. The new Beacon variant, which focused on police accountability, hit in September 2025. This provides attackers with the ability to execute native and dynamic commands with PowerShell.
Sophisticated Delivery Mechanisms
The delivery mechanism used by UTA0388 is especially interesting, specifically for its use of social engineering tactics. Further complicating matters, victims are greeted by a spam CAPTCHA page that looks convincing, making victims more likely to be ensnared by the ploy.
“The goal of these spear phishing campaigns was to socially engineer targets into clicking links that led to a remotely hosted archive containing a malicious payload,” explained Volexity. This strategy misleads the targets but covers up what is really meant on the messages.
Once the ZIP archive is downloaded and extracted, the embedded LNK file activates a PowerShell script. This script runs a decoy document while quietly dropping PlugX in the background. By leveraging DLL side-loading techniques, UTA0388 increases the stealth of its operations, posing a greater challenge to identification and detection by security practitioners.

