Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Insights from 160 million attack simulations

Transparent tribes target the Indian government with desktop shortcuts weaponized via phishing

The brightest fastest radio burst was detected 130 million light years away

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Transparent tribes target the Indian government with desktop shortcuts weaponized via phishing
Identity

Transparent tribes target the Indian government with desktop shortcuts weaponized via phishing

userBy userAugust 25, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 25, 2025Ravi LakshmananMalware/Cyber ​​Attacks

It has been observed that the Advanced Persistent Threat (APT) actor, known as the Transparent Tribe, is targeted both Windows and Boss (Bharat Operating System Solutions) Linux systems with malicious desktop shortcut files in attacks targeting Indian government agencies.

“Initial access is achieved through spear fishing emails,” Cyfirma said. “The Linux Boss environment is targeted via weaponized .DeskTop shortcut files.

The transparent tribe, also known as APT36, is rated as Pakistani origins and has a storied history of invading Indian government agencies with various remote access Trojans (rats) along with their groups, along with their subcluster side copies.

The latest dual platforms show the continued refinement of hostile groups, allowing them to expand their targeting footprint and ensure access to compromised environments.

Cybersecurity

The attack chain starts with a phishing email that appears to satisfy the notification, but in reality it is nothing more than a Booby-Trapped Linux desktop shortcut file (“Meeting_ltr_id1543ops.pdf.desktop”). These files lead to running shell scripts, spoofing PDF documents to trick recipients and open them.

Shell scripts act as a dropper for getting hex-encoded files from the attacker control server (“SecureStore”[.]cv”) and save it to disk as an elf binary and open a decoy PDF hosted on Google Drive by launching Mozilla Firefox at the same time. The GO-based binary establishes contact with the hard-coded command and control (C2) server, ModGovindia.[.]Space: 4000, receive command, get payload and remove data.

The malware also establishes persistence using Cron jobs that automatically run the main payload after a system restart or process is terminated.

Cybersecurity company CloudSek also independently reported activities, saying it is equipped to run system reconnaissance and perform a series of dummy prevention and anti-sandbox checks to abandon the emulator and static analyzer.

Furthermore, an analysis of Hunt.io’s campaign revealed that the attack was designed to deploy a known transparent tribe backdoor called Poseidon, which allows for data collection, long-term access, qualification harvesting, and potentially lateral movement.

“The ability to customize delivery mechanisms according to the operating environment of APT36 victims increases the likelihood of success while maintaining sustained access to critical government infrastructure and circumventing traditional security controls,” Cyfirma said.

The disclosure comes weeks after transparent tribal actors targeted Indian defence organizations and associated government agencies using a spoofed domain, with the ultimate goal of stealing qualifications and two-factor authentication (2FA) codes. It is believed that users will be redirected to these URLs via spear phishing emails.

“If you enter a valid email ID on the first phishing page and click the ‘Next’ button, the victim will be redirected to the second page, prompting the user to enter the email account password and Kavach authentication code,” Cyfirma said.

It is worth noting that Kavach’s targeting, a 2FA solution used by Indian government agencies to improve account security, is a trial and error tactic adopted by transparent tribes and side copy since early 2022.

Identity Security Risk Assessment

“The use of typo domains in conjunction with infrastructure hosted on Pakistan-based servers is consistent with the group’s established tactics, techniques and procedures,” the company said.

The findings also follow the discovery of another campaign carried out by South Asians to attack Bangladesh, Nepal, Pakistan, Sri Lanka and Turkey via spear phishing emails designed for theft like qualifications using look pages hosted on Netlify and Pages.dev.

“These campaigns mimic the formal communications that allow victims to trick them into entering their credentials on fake login pages,” Hunt.io said earlier this month that it was attributed to a hacking group called Sidewinder.

“The spoofed gimbra and secure portal page looked like an official email, file sharing or document upload service, urging victims to submit their credentials through a fake login panel.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe brightest fastest radio burst was detected 130 million light years away
Next Article Insights from 160 million attack simulations
user
  • Website

Related Posts

Insights from 160 million attack simulations

August 25, 2025

Malicious GO modules pose as SSH brute force tool and steal credentials via Telegram bot

August 24, 2025

Push Geoserver Exploits, Polarradege, Gayfemboy Push Cybercrime beyond traditional botnets

August 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Insights from 160 million attack simulations

Transparent tribes target the Indian government with desktop shortcuts weaponized via phishing

The brightest fastest radio burst was detected 130 million light years away

BlueSky blocks Mississippi services across age guarantee laws

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.