Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Anduril has invented a novel drone flying contest where work is the prize

Android smartphones are getting more anti-theft features

Indian states consider Australian-style ban on social media for children

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Experts detect Pakistan-linked cyber attack targeting Indian government agencies
Identity

Experts detect Pakistan-linked cyber attack targeting Indian government agencies

userBy userJanuary 27, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 27, 2026Threat Intelligence/Cyber ​​Espionage

Indian government agencies have been targeted in two campaigns conducted by threat actors operating in Pakistan using previously undocumented trade channels.

These campaigns were codenamed Gopher Strike and Sheet Attack by Zscaler ThreatLabz, identified in September 2025.

“While these campaigns share some similarities with APT36, a Pakistan-linked advanced persistent threat (APT) group, we assess with medium confidence that the activity identified in this analysis may originate from a new subgroup or another Pakistan-linked group operating in parallel,” researchers Sudeep Singh and Yin Hong Chan said.

The name Sheet Attack comes from the use of legitimate services such as Google Sheets, Firebase, and email for command and control (C2). Meanwhile, Gopher Strike is credited with using phishing emails as a starting point to deliver PDF documents containing blurry images overlaid with seemingly innocuous pop-ups instructing recipients to download an update for Adobe Acrobat Reader DC.

cyber security

The main purpose of this image is to give the user the impression that they need to install an update to access the document’s content. with fake update dialog[ダウンロードしてインストール]Clicking the button will trigger the download of the ISO image file only if the request originates from an IP address located in India and the user agent string corresponds to Windows.

“These server-side checks prevent automated URL analysis tools from retrieving ISO files and ensure that malicious files are delivered only to their intended targets,” Zscaler said.

The malicious payload embedded within the ISO image is a Golang-based downloader called GOGITTER that creates Visual Basic Script (VBScript) files if they do not exist in the following locations: “C:\Users\Public\Downloads”, “C:\Users\Public\Pictures”, and “%APPDATA%”. This script is designed to fetch VBScript commands every 30 seconds from two preconfigured C2 servers.

GOGITTER also sets persistence using a scheduled task configured to run the VBScript file mentioned above every 50 minutes. Additionally, verify that there is another file named “adobe_update.zip” within the same three folders. If the ZIP file does not exist, pull the archive from a private GitHub repository (“github”).[.]com/jaishankai/sockv6″). GitHub account created on June 7, 2025.

Upon successful download, the attack chain sends an HTTP GET request to the domain “adobe-acrobat”.[.]in” could inform threat actors that the endpoint is infected. GOGITTER then extracts and executes “edgehost.exe” from the ZIP file. GITSHELLPAD, a lightweight Golang-based backdoor, leverages private GitHub repositories for threat actor-controlled C2s.

Specifically, it polls the C2 server every 15 seconds with a GET request to access the contents of a file named “command.txt”. Supports 6 different commands –

cd .., change working directory to parent directory. cd, change directory to the specified path. run, executes a command in the background without capturing output. Upload, uploads the local file specified by path to a GitHub repository. Download, downloads the file to the specified path. By default, cmd /c is used to run the command and capture the output.

cyber security

The results of the command execution are saved in a file called “result.txt” and uploaded to your GitHub account via an HTTP PUT request. If the command runs successfully, “command.txt” will be removed from your GitHub repository.

Zscaler said it also observed that the attacker used cURL commands to download RAR archives after gaining access to the victim’s machine. The archive contains a utility that collects system information and drops GOSHELL, a custom Golang-based loader used to deliver Cobalt Strike Beacons after multiple rounds of decoding. Wipe tools off the machine after use.

“GOSHELL’s size was artificially inflated to approximately 1 gigabyte by adding junk bytes to a Portable Executable (PE) overlay, likely to evade detection by antivirus software,” the cybersecurity firm said. “GOSHELL only runs on specific hostnames by comparing the victim’s hostname to a hard-coded list.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAmazon closes Amazon Go and Amazon Fresh physical stores
Next Article WhatsApp deploys lockdown-style security mode to protect targeted users from spyware
user
  • Website

Related Posts

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026

ClickFix attack spreads using fake CAPTCHAs, Microsoft Scripts, and trusted web services

January 27, 2026

Prioritize, validate, and key results

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Anduril has invented a novel drone flying contest where work is the prize

Android smartphones are getting more anti-theft features

Indian states consider Australian-style ban on social media for children

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.