Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Advanced PFAS treatment technology: innovation and development

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT36 and SideCopy launch cross-platform RAT campaign against Indian companies
Identity

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

userBy userFebruary 11, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 11, 2026Cyber ​​espionage/threat intelligence

India’s defense sector and government-linked organizations have been targeted by multiple campaigns aimed at compromising Windows and Linux environments using remote access Trojans that can steal sensitive data and ensure continued access to infected machines.

This campaign is characterized by the use of malware families such as Geta RAT, Ares RAT, and DeskRAT, and is often attributed to Pakistan-aligned threat clusters tracked as SideCopy and APT36 (also known as Transparent Tribe). SideCopy has been around since at least 2019 and is believed to operate as a division of the Transparent Tribe.

“Taken together, these campaigns reinforce a familiar but evolving narrative,” said Aditya K. Sood, vice president of security engineering and AI strategy at Aryaka. “Transparent Tribe and SideCopy aren’t reinventing espionage; they’re refining it.”

“By expanding our cross-platform reach, leveraging memory-resident technologies, and experimenting with new delivery vectors, this ecosystem continues to operate below the noise floor while maintaining its strategic focus.”

What all campaigns have in common is the use of phishing emails containing malicious attachments or embedded download links to lure potential targets to attacker-controlled infrastructure. These initial access mechanisms act as a conduit to open Windows shortcuts (LNKs), ELF binaries, and PowerPoint add-in files, which, when opened, launch a multi-step process to drop the Trojan.

This malware family is designed to provide persistent remote access, enable system reconnaissance, collect data, execute commands, and facilitate long-term post-compromise operations in both Windows and Linux environments.

One of the attack chains is as follows: The malicious LNK file calls ‘mshta.exe’ to run an HTML application (HTA) file hosted on the compromised legitimate domain. The HTA payload includes JavaScript to decrypt the embedded DLL payload. This processes the embedded data blob, writes a decoy PDF to disk, connects to a hardcoded command and control (C2) server, and displays the saved decoy file.

After displaying the decoy document, the malware checks installed security products and adapts its persistence method accordingly before deploying Geta RAT on infected hosts. It is worth noting that this attack chain was detailed by CYFIRMA and Seqrite Labs researcher Sathwik Ram Prakki in late December 2025.

Geta RAT supports a variety of commands to collect system information, enumerate running processes, terminate specified processes, list installed apps, collect credentials, retrieve and replace the contents of the clipboard with attacker-supplied data, capture screenshots, perform file operations, execute arbitrary shell commands, and collect data from attached USB devices.

Running alongside this Windows-focused campaign is a Linux variant that uses Go binaries as a starting point to drop the Python-based Ares RAT via shell scripts downloaded from external servers. Similar to Geta RAT, Ares RAT can execute a wide range of commands to collect sensitive data, as well as execute Python scripts and commands issued by threat actors.

Aryaka said he also observed another campaign in which the Golang malware DeskRAT was delivered via a malicious PowerPoint add-in file. This add-in file runs an embedded macro to establish outbound communication with the remote server and retrieve the malware. APT36’s use of DeskRAT was documented by Sekoia and QiAnXin XLab in October 2025.

“These campaigns demonstrate well-resourced espionage-focused threat actors intentionally targeting India’s defense, government, and strategic sectors through defense-themed decoys, official document spoofing, and regionally trusted infrastructure,” the company said. “This work extends beyond defense to policy, research, critical infrastructure, and defense-adjacent organizations operating within the same trusted ecosystem.”

“The deployment of Desk RAT, alongside Geta RAT and Ares RAT, highlights an evolving toolkit optimized for stealth, persistence, and long-term access.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHumanoid robot startup Apptronik raises $935 million at a valuation of more than $5 billion
Next Article Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce
user
  • Website

Related Posts

Public training opens the door to crypto mining in Fortune 500 cloud environments

February 11, 2026

Microsoft patches 59 vulnerabilities, including 6 actively exploited zero-days

February 11, 2026

SSHStalker botnet uses IRC C2 to control Linux systems via legacy kernel exploits

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Advanced PFAS treatment technology: innovation and development

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

Humanoid robot startup Apptronik raises $935 million at a valuation of more than $5 billion

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.