Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

NPL Quantum Circuit Imaging Unlocks Stable Quantum Computers

Researchers reveal Batavia window spyware and steal documents from Russian companies

CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT36 SPOOFS INDIA POST website infects Windows and Android users with malware
Identity

APT36 SPOOFS INDIA POST website infects Windows and Android users with malware

userBy userMarch 27, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 27, 2025Ravi LakshmananMobile Security/Malware

India Post Website

The Advanced Persistent Threat (APT) group with ties to Pakistan is attributed to the creation of fake websites decorated in Indian public sector postal systems as part of a campaign designed to infect both domestic windows and Android users.

Cybersecurity company Cyfirma attributes the campaign to a threat actor called APT36, also known as the Transparent Tribe.

A fraudulent website that mimics an Indian post is named “Postindia”.[.]site. “Who lands on the site from Windows Systems will be asked to download the PDF document, but users accessing from Android devices will be provided with a malicious application package (“indiapost.apk”) file.

Cybersecurity

“When accessed from the desktop, the site provides malicious PDF files containing the ‘Clickfix’ tactic,” Cyfirma said. “This document tells the user to press Win + R, paste the provided PowerShell command into the Run dialog and run it – it could compromise the system.”

An analysis of EXIF ​​data associated with dropped PDFs shows that it was created on October 23, 2024 by an author named “PMYLS”. The domain impersonating India Post was registered on November 20th, 2024, about a month later.

India Post Website

The PowerShell code is designed to download the next stage payload from a remote server (“88.222.245[.]211”) It is currently inactive.

Meanwhile, when the same site accesses from an Android device, it will install mobile apps to encourage users to have a “better experience.” Once installed, this app requires extensive permissions to harvest and remove sensitive data, including contact lists, current locations, and files from external storage.

Cybersecurity

“Android apps change icons to mimic unsuspecting Google account icons to hide activity, making it difficult for users to find and uninstall apps when they want to delete them,” the company said. “This app also has the ability to force users to accept permissions if denied on the first instance.”

Malicious apps are designed to continue running in the background after the device is restarted, while explicitly looking for permission to ignore battery optimization.

“Clickfix is ​​increasingly being exploited by cybercriminals, fraudsters and APT groups, as reported by other researchers observing its use in the wild,” Cyfirma said. “This new tactic poses a serious threat because it can target both unsuspecting and tech-savvy users who may not be familiar with such methods.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe new report explains why CASB solutions can’t deal with Shadowers and how to fix it
Next Article Animoca Brands Sonyium By Sony Block Solutions Labs will partner with Moca Network’s ID layer and launch San Frantokyo’s animation initiative on Soneium
user
  • Website

Related Posts

Researchers reveal Batavia window spyware and steal documents from Russian companies

July 8, 2025

CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation

July 8, 2025

The SEO addiction campaign targets over 8,500 SMB users with malware disguised as AI tools

July 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

NPL Quantum Circuit Imaging Unlocks Stable Quantum Computers

Researchers reveal Batavia window spyware and steal documents from Russian companies

CISA adds four important vulnerabilities to the KEV catalog through aggressive exploitation

Fortnite Maker Epic Games resolves anti-trust cases against Samsung

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.