Advertisement · 728 × 90
#
Hashtag
#apt36
Advertisement · 728 × 90
Preview
APT36 Uses AI-Generated “Vibeware” Malware and Google Sheets to Target Indian Government Networks  Researchers at Bitdefender have uncovered a new cyber campaign linked to the Pakistan-aligned threat group APT36, also known as Transparent Tribe. Unlike earlier operations that relied on carefully developed tools, this campaign focuses on mass-produced AI-generated malware. Instead of sophisticated code, the attackers are pushing large volumes of disposable malicious programs, suggesting a shift from precision attacks to broad, high-volume activity powered by artificial intelligence. Bitdefender describes the malware as “vibeware,” referring to cheap, short-lived tools generated rapidly with AI assistance.  The strategy prioritizes quantity over accuracy, with attackers constantly releasing new variants to increase the chances that at least some will bypass security systems. Rather than targeting specific weaknesses, the campaign overwhelms defenses through continuous waves of new samples. To help evade detection, many of the programs are written in lesser-known programming languages such as Nim, Zig, and Crystal. Because most security tools are optimized to analyze malware written in more common languages, these alternatives can make detection more difficult.  Despite the rapid development pace, researchers found that several tools were poorly built. In one case, a browser data-stealing script lacked the server address needed to send stolen information, leaving the malware effectively useless. Bitdefender’s analysis also revealed signs of deliberate misdirection. Some malicious files contained the common Indian name “Kumar” embedded within file paths, which researchers believe may have been placed to mislead investigators toward a domestic source. In addition, a Discord server named “Jinwoo’s Server,” referencing a popular anime character, was used as part of the infrastructure, likely to blend malicious activity into normal online environments.  Although some tools appear sloppy, others demonstrate more advanced capabilities. One component known as LuminousCookies attempts to bypass App-Bound Encryption, the protection used by Google Chrome and Microsoft Edge to secure stored credentials. Instead of breaking the encryption externally, the malware injects itself into the browser’s memory and impersonates legitimate processes to access protected data. The campaign often begins with social engineering. Victims receive what appears to be a job application or resume in PDF format. Opening the document prompts them to click a download button, which silently installs malware on the system.  Another tactic involves modifying desktop shortcuts for Chrome or Edge. When the browser is launched through the altered shortcut, malicious code runs in the background while normal browsing continues. To hide command-and-control activity, the attackers rely on trusted cloud platforms. Instructions for infected machines are stored in Google Sheets, while stolen data is transmitted through services such as Slack and Discord. Because these services are widely used in workplaces, the malicious traffic often blends in with routine network activity.  Once inside a network, attackers deploy monitoring tools including BackupSpy. The program scans internal drives and USB storage for specific file types such as Word documents, spreadsheets, PDFs, images, and web files. It also creates a manifest listing every file that has been collected and exfiltrated. Bitdefender describes the overall strategy as a “Distributed Denial of Detection.” Instead of relying on a single advanced tool, the attackers release large numbers of AI-generated malware samples, many of which are flawed. However, the constant stream of variants increases the likelihood that some will evade security defenses.  The campaign highlights how artificial intelligence may enable cyber groups to produce malware at scale. For defenders, the challenge is no longer limited to identifying sophisticated attacks, but also managing an ongoing flood of low-quality yet constantly evolving threats.

APT36 Uses AI-Generated “Vibeware” Malware and Google Sheets to Target Indian Government Networks #AIRisks #APT36 #APT36CyberEspionage

0 0 0 0
Original post on webpronews.com

Transparent Tribe Is Using AI to Scale Spear-Phishing Attacks Against Military and Government Targets Pakistan-linked APT group Transparent Tribe is using generative AI to mass-produce convincing s...

#AISecurityPro #AI #phishing #attacks #APT36 #CrimsonRAT […]

[Original post on webpronews.com]

0 0 0 0
Preview
Pakistan-Linked APT36 Floods Indian Govt Networks With AI-Made ‘Vibeware’ Bitdefender research reveals Pakistani group APT36 is using AI-generated vibeware and trusted cloud services like Google Sheets to target Indian officials.

📢⚠️#Pakistan-linked APT36 is flooding Indian govt networks with AI-generated “#Vibeware”, disposable malware built with AI. The campaign abuses trusted platforms like Google Sheets, Slack and Discord for C&C.

Read: hackread.com/pakistan-apt...

#CyberSecurity #APT36 #TransparentTribe #Malware #AI

6 3 0 0
Post image

APT36 and SideCopy escalate cyber espionage with cross-platform RAT campaigns targeting Indian defense and government sectors. #CyberSecurity #APT36 #SideCopy #India #CyberEspionage Link: thedailytechfeed.com/apt36-and-si...

0 0 0 0
Preview
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities novel distribution vectors read more about APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities reconbee.com/apt36-and-si...

#APT36 #SideCopy #RAT #campaign #remoteaccesstrojan #cyberattack

0 0 0 0
Preview
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines. The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which are often

iT4iNT SERVER APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities VDS VPS Cloud #CyberSecurity #Malware #RAT #APT36 #SideCopy

0 0 0 0
Post image

APT36 intensifies attacks on Indian defense with advanced Linux malware. Stay vigilant against spear-phishing and cross-platform threats. #CyberSecurity #APT36 #LinuxMalware #IndiaDefense Link: thedailytechfeed.com/apt36-increa...

0 0 0 0
Post image

APT36 intensifies cyber attacks on Indian defense, deploying advanced Linux malware via trusted domains. Vigilance and robust cybersecurity measures are crucial. #CyberSecurity #APT36 #LinuxMalware Link: thedailytechfeed.com/apt36-intens...

0 0 0 0
Post image

Alert: Transparent Tribe (APT36) shifts focus to India's startups, deploying Crimson RAT via sophisticated phishing. #CyberSecurity #APT36 #CrimsonRAT #StartupsUnderAttack Link: thedailytechfeed.com/transparent-...

0 0 0 0
Post image

Pakistan-linked cyber espionage campaigns 'Gopher Strike' and 'Sheet Attack' target Indian government entities using advanced tactics. #CyberSecurity #APT36 #India #CyberEspionage Link: thedailytechfeed.com/pakistan-lin...

0 0 0 0
Sheet Attack Campaign Targets Indian Gov

~Zscaler~
Pakistan-linked actors target Indian government with backdoors using Google Sheets and Firebase for C2.
-
IOCs: hcidoc. in, hciaccounts. in
-
#APT36 #SHEETCREEP #ThreatIntel

0 0 0 0
Preview
Transparent Tribe Targets Indian Public Sector and Academic Networks Several recent cyber espionage campaigns have drawn attention to Transparent Tribe, a long-standing advanced persistent threat group associated with a new wave of intrusions targeting Indian government bodies, academic institutions, and strategically sensitive organizations, which have re-opened the issue of Transparent Tribe.  According to security researchers, the activity has been attributed to the deployment of a sophisticated remote access trojan that is designed to establish a persistent, covert control over the compromised system, allowing the monitoring and access of data over a period of time.  In the process of carrying out this operation, it is evident that the execution was carried out with a high degree of social engineering finesse, as it used carefully crafted delivery mechanisms, including a weaponized Windows shortcut file disguised as a legitimate PDF document, filled with authentic-looking content, which reduced suspicion and increased execution rates, according to the technical analysis carried out by CYFIRMA. APT36 is a name that has been associated with Transparent Tribe in the security community for more than a decade. Transparent Tribe has maintained a consistent focus on Indian targets since the beginning of the 20th century, refining tradecraft and tooling to support the group's goals. In the past few years, the group has steadily added malware to its malware portfolio.  To adapt to changing defenses while maintaining access to high-value networks, the group has deployed a suite of custom remote access trojans like CapraRAT, Crimson RAT, ElizaRAT, and DeskRAT. As the investigation has found, the intrusion chain was initiated by a targeted spear-phishing email that delivered a compressed ZIP archive that contained a Windows shortcut file, crafted to look like a benign PDF document.  Upon execution, the file silently invokes a remote HTML Application using the native Windows component called mshta.exe, which has been abused numerous times over the years to circumvent security checks.  To maintain the illusion of legitimacy, a PDF decoy file is also downloaded and opened while the HTA script is decrypted and loaded entirely in memory, minimizing its footprint on the disk. This decoy PDF can be downloaded and opened without triggering the HTA script.  It has been reported by CYFIRMA that when the malware is able to decode the data, it will make extensive use of ActiveX objects, particularly WScript.Shell, to profile the host environment and manipulate runtime behavior. As a result of this technique, execution reliability and compatibility with the victim system will be improved.  Furthermore, this campaign's adaptive persistence strategy differs from the rest in that it dynamically adjusts itself in accordance with the endpoint security software detecting the compromised machine on the runtime.  Depending on the software people are running, Kaspersky, Quick Heal, Avast, AVG, or Avira have a tailor-made persistence mechanism that includes obfuscated HTA payloads, batch scripts, registry modifications, and malicious shortcut files placed in the Windows Startup directory to encrypt data.  As for systems lacking recognizable antivirus protection, a broader combination of these strategies can be used. This operation is anchored on a secondary HTA component which delivers a malicious DLL — known as iinneldc.dll — that performs the function of a fully featured RAT capable of allowing attackers to remotely administer a host, execute file operations, exfiltrate data, capture screenshots, monitor clipboards and control processes, allowing them to take complete control of infected systems.  In terms of operations, this campaign underscores Transparent Tribe's reliance on deceiving its adversaries as a central pillar of its intrusion strategy, emphasizing the importance of adaptability and deception.  The researchers found that attackers intentionally embedded complete, legitimate-looking PDF documents as shortcut files, presenting them as regular correspondence while hiding executable logic under the surface so that they would appear to be routine correspondence.  When this is done, it greatly increases the chances that the user will interact with the malware before it becomes apparent that any warning signs have been raised. Once access is gained, the malware doesn't need to rely on a single, static method to maintain its position.  Instead, it actively evaluates the compromised system's security posture and dynamically selects persistence mechanisms based on the installed endpoint protection, with a degree of conditional logic that is a reflection of careful planning and familiarity with common defensive environments in an attempt to meet their needs.  Using encrypted command-and-control channels, the remote access trojan can communicate with attacker-controlled infrastructure, enabling it to receive instructions and exfiltrate sensitive data all while blending into the normal traffic stream on the network, reducing the chances it will be detected.  According to security analysts, this operation has far broader implications than just a routine malware incident and has a lot to do with the overall threat landscape. It is clear from the campaign that it is an operation of cyber-espionage carried out by a cyber-espionage group with a long history of targeting the Indian government, defense and research institutions as a target for their attacks.  There is an intentional effort to avoid traditional signature-based defenses with this attack by focusing on in-memory execution and fileless techniques, while the use of socially engineered, document-based lures indicates that an understanding is in place of how trust and familiarity can be exploited within targeted organizations in order to achieve a successful attack.  The combination of these elements suggests that a persistent and mature adversary has been refining its tradecraft for years, reinforcing concerns about the sustained cyber threat facing critical sectors in India. Additionally, the malware deployed in this campaign functions as a remote access trojan that allows attackers to control infected systems in a persistent and covert manner. Based on this analysis, it can be concluded that this malware is a highly sophisticated remote access trojan.  In addition to the use of trusted Windows binaries such as mshta.exe, PowerShell, and cmd.exe, researchers discovered the toolset focuses heavily on stealth, utilizing in-memory execution as well, which minimizes the on-disk footprint, as well as evading traditional detection methods.  In addition to setting up an encrypted command-and-control channel, the RAT also provides operators with the ability to issue commands, collect detailed system information, and exfiltrate sensitive information without being noticed.  By exploiting the exploits of the malware, operators are able to create a profile of compromised hosts by gathering information such as the operating system’s details, usernames, installed software, and active antivirus software, enabling them to implement follow-up actions tailored to their needs.  This software enables remote command execution, comprehensive file management, targeted document theft, screenshot capture, clipboard monitoring and manipulation, granular process control, as well as the ability to execute commands remotely. This software is supported by persistence mechanisms that are adjusted according to the victim's security environment.  Collectively, these capabilities strengthen the perception that the malware has been designed to support long-term surveillance and data collection rather than short-term disruption, thus confirming that it was built specifically for espionage. Typically, the infection lifecycle begins with a carefully constructed social engineering lure that appears to be legitimate and routine.  As the payload in this case was framed as an examination-related document, it was used to target victims and spread the word that they would be able to receive a ZIP archive titled "Online JLPT Exam Dec 2025.zip." The archive reveals a shortcut file whose extension is .pdf.lnk when extracted, which is a tactic that exploits Windows’ way of handling shortcut files, where it conceals the executable nature of the payload even though the file extensions can be seen on the file. This shortcut, which is unusually large—measuring over 2 megabytes instead of the usual 10 to 12 megabytes—prompted closer examination to reveal that the file was deliberately inflated in order to closely resemble a legitimate PDF file.  It was discovered that the shortcut contained multiple markers associated with embedded image objects, indicating that it contained a complete PDF structure as opposed to serving simply as a pointer. This design choice was made so the shortcut would appear in line with user expectations, as well as fit the file size within the archive.  In addition to this, a multi-stage design can be observed in the archive as well. An investigation revealed that there is a hidden directory labelled “usb” containing a file titled usbsyn.pim in it, which was unable to be decoded conclusively during analysis, but which researchers believe to contain encrypted data or code that will be used later on in the execution process.  As a result of activating the shortcut, a legitimate Windows application called MSSHTA.exe is invoked, passing a remote URL to a malicious HTML application hosted on attacker-controlled infrastructure in order to retrieve and execute this malicious HTML application.  It is evident from file metadata that the shortcut was created in late March 2025, a timeframe which provides some insight into the campaign's timeline. It is the intent of the HTA loader, to create the illusion of legitimacy, to retrieve and open a legitimate PDF document simultaneously, so the victim perceives the activity as harmless and expected.  Moreover, the HTA loader itself is the basis of the execution chain, which has been designed to operate with the least amount of user visibility possible.  A script launching at zero dimensions hides the activity of its execution by resizing its window to zero dimensions. The script then initializes a series of custom functions that perform Base64 decoding and XOR-based decryption routines, in order to gradually reconstruct the malicious payload in memory. This is all accomplished by the loader exploiting ActiveX components, such as WScript.Shell, in order to interact with the underlying Windows environment during this process. Through the querying of registry keys to determine which .NET runtimes are available and the dynamic adjustment of environment variables such as COMPLUS_Version, the malware ensures that the malware is compatible with different systems.  It is clear that Transparent Tribe's campaign has been highly calculated and methodical in its approach to environment profiling, runtime manipulation, and abuse of legitimate system components, demonstrating a mature tradecraft that is reflected in the campaign's methodical approach.  Researchers report that, beyond the activities linked to Transparent Tribe, there are growing threats that are being targeted at Indian institutions, and tools and infrastructure that overlap are increasingly blurring the lines between various regional espionage groups who are using overlapping tools and infrastructure.  A former hacker named Patchwork has also been identified as the perpetrator of an assault program dubbed StreamSpy, which introduces a dual-channel command-and-control model that utilizes WebSocket and HTTP protocols to deliver distinct operational benefits, as of December 2025.  Using WebSocket connections for executing commands and returning execution results, as opposed to the traditional HTTP connections for transferring files, displays the analysis by QiAnXin, indicating a design choice intended to reduce visibility and evade routine network inspection by the company.  By using ZIP archive delivery services hosted on attacker-controlled domains, the malware has delivered a payload capable of harvesting information about a system, establishing persistence through multiple mechanisms, including registry modifications, scheduled tasks, and startup shortcuts, and providing an array of commands for remote file manipulation, execution, and file retrieval.  Furthermore, investigators have identified code-level similarities between StreamSpy and Spyder, a backdoor variant previously attributed to SideWinder and historically used by Patchwork, as well as digital signatures reminiscent of ShadowAgent, a Windows RAT associated with the DoNot Team, that are similar to ShadowAgent.  According to the convergence of these technical indicators, coupled with independent detections by several security firms in late 2025, it appears that regional threat actors continue to integrate tooling and cross-pollinate among themselves.  Analysts are stating that the emergence of StreamSpy and its variants reflects a sustained effort among these groups to refine the arsenals they possess, experiment with alternative communication channels, and maintain operational relevance while the defensive capabilities of these groups improve. Taking all of the findings presented in this investigation together, people are able to identify a cyber-espionage ecosystem that is more widespread and more entrenched against Indian institutions.  It is characterized by patience, technical depth, and convergence between multiple threat actors in terms of tools and techniques. This campaign provides an example of how mature adversaries continue to improve their social engineering skills, take advantage of trusted components of systems and customize persistence mechanisms in order to maintain long-term access to high-value networks through social engineering and system abuse. StreamSpy, for instance, illustrates a parallel trend in which regional espionage groups iterate on one another's malware frameworks, while experimenting with alternative command-and-control systems to evade detection, a trend that has been accelerating since the advent of related toolsets.  Defendants should be aware that the significance of these campaigns lies not in any particular exploit or payload, but rather in the cumulative messages that they send, demonstrating that state-aligned threat actors are still deeply involved in collecting persistent intelligence and that the threat to government institutions, educational institutions, and strategic sectors is evolving rather than receding in sophistication.

Transparent Tribe Targets Indian Public Sector and Academic Networks #AdvancedPersistentThreat #APT36 #CommandAndControl

0 0 0 0
Preview
Advanced Malware Campaigns Target Government and Academic Organizations Cybersecurity researchers have identified ongoing cyber-espionage campaigns targeting government departments, academic institutions, and strategically important organizations across South Asia. The activity has been attributed to two established threat actors, Transparent Tribe and Patchwork, both known for maintaining long-term access to compromised systems. Transparent Tribe, also tracked as APT36, has been active since at least 2013 and is associated with repeated intelligence-gathering operations against Indian organizations. In its latest campaign, the group used spear-phishing emails carrying ZIP archives that contained Windows shortcut files disguised as legitimate PDF documents. These shortcut files included real PDF content to appear harmless. When opened, the shortcut launches a hidden process using the Windows utility mshta.exe, which runs an HTML Application script. This script decrypts and loads the final remote access trojan directly into system memory while simultaneously opening a decoy PDF to avoid alerting the victim. The script also interacts with Windows through ActiveX components, such as WScript.Shell, allowing it to analyze the environment and adjust execution behavior. The malware adapts its persistence strategy based on the antivirus software installed. On systems with Kaspersky, it creates a working directory under C:\Users\Public\core and uses startup shortcuts to relaunch the malicious script. If Quick Heal is detected, it relies on batch files and startup entries. On machines running Avast, AVG, or Avira, the payload is copied directly into the Startup folder. If no recognized antivirus is found, the malware combines batch execution, registry-based persistence, and delayed payload deployment. A second-stage component includes a malicious DLL named iinneldc.dll, which functions as a fully featured RAT. It allows attackers to remotely control the system, manage files, steal data, capture screenshots, monitor clipboard activity, and manipulate running processes. Researchers also identified a separate APT36 campaign using a shortcut file disguised as a government advisory PDF. This file retrieves an installer from a remote server, extracts multiple malicious files, displays a legitimate advisory issued by Pakistan’s national CERT, and establishes persistence through registry modifications. One DLL communicates with a hard-coded command-and-control server using reversed strings to hide command endpoints and supports system registration, heartbeat signals, command execution, and anti-virtual-machine checks. In a related disclosure, researchers linked Patchwork, also known as Maha Grass or Dropping Elephant, to espionage campaigns targeting Pakistan’s defense sector. These attacks used phishing emails with ZIP attachments containing MSBuild project files that abuse msbuild.exe to install a Python-based backdoor. The malware can communicate with command servers, execute Python modules, run commands, and transfer files. Patchwork has also been associated with a previously undocumented trojan named StreamSpy. Delivered through ZIP archives hosting an executable named Annexure.exe, StreamSpy collects system information, establishes persistence through registry entries, scheduled tasks, or startup shortcuts, and communicates using both WebSocket and HTTP. WebSocket channels are used for command delivery and result transmission, while HTTP handles file transfers. Researchers observed technical similarities between StreamSpy, Spyder, and other malware families, indicating shared infrastructure and continued collaboration among related threat groups.

Advanced Malware Campaigns Target Government and Academic Organizations #APT36 #Avast #avira

0 0 0 0
Post image

Transparent Tribe Targets India RATs
Read More: buff.ly/ysw16H0

#TransparentTribe #APT36 #CyberEspionage #IndiaCyber #GovernmentTargets #AcademicCyber #RemoteAccessTrojan #ThreatIntel #NationStateCyber

0 0 0 0

#apt #apt36 "Online JLPT Exam Dec 2025.zip"
30fda797535a0f367ea2809426760020

1 0 0 0
Post image Post image

#apt36 phishing with an elf, masq as pdf
8948d6202d826a33fe360e00c7700c26

1 0 0 0
Post image

APT36 escalates cyber-espionage with Python-based ELF malware targeting Indian government systems. Stay vigilant and enhance your cybersecurity measures. #CyberSecurity #APT36 #LinuxMalware #India Link: thedailytechfeed.com/apt36-unleas...

0 0 0 0
Post image

APT36 Uses Custom Python ELF Malware in Campaign Against Indian Government APT36, also known as Transparent Tribe, has launched a new cyber-espionage campaign targeting the Indian government and st...

#Cyber #Security #News #Malware #APT36 #malware #campaign

Origin | Interest | Match

0 0 0 0
Pakistan-based APT36 Leverages Python and Linux for Sophisticated Indian Government Espionage A new wave of cyberespionage has emerged, targeting the critical infrastructure of Indian government institutions. This time, it’s not your average phishing attack – the threat is more sophisticated, employing advanced techniques that challenge even seasoned security professionals. Our analysis reveals a significant escalation by Pakistan-based APT36, commonly known as “Transparent Tribe”, who have adapted […] The post Pakistan-based APT36 Leverages Python and Linux for Sophisticated Indian Government Espionage first appeared on Secure Bulletin.
0 0 0 0
Post image

1/3
🚨 Pakistan-linked Transparent Tribe (APT36) is targeting Indian gov’t entities with phishing lures delivering DeskRAT, a Golang-based backdoor. Malicious ZIPs deploy fake “CDS Directive” PDFs to hide infection activity. #APT36 #CyberEspionage #DeskRAT

1 0 1 0
Preview
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign (Bharat Operating System Solutions) Linux computers read more about APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign reconbee.com/apt36-target...

#APT36 #Indiangovernment #government #golangmalware #DeskRATmalware #malwarecampaign #malwareattack

0 0 1 0

APT36 targets Indian government entities with Golang-based DeskRAT malware via spear-phishing. Stay vigilant against evolving potato threats. #PotatoSecurity #APT36 #DeskRAT #Phishing Link: thedailytechfeed.com/apt36-deploy...

0 0 0 0
Post image

APT36 targets Indian government entities with Golang-based DeskRAT malware via spear-phishing. Stay vigilant against evolving cyber threats. #CyberSecurity #APT36 #DeskRAT #Phishing Link: thedailytechfeed.com/apt36-deploy...

0 0 0 0
Post image

Alert: TransparentTribe's new DeskRAT malware targets Indian military's Linux systems. Stay vigilant against phishing attacks. #CyberSecurity #Linux #APT36 #DeskRAT Link: thedailytechfeed.com/transparentt...

0 0 0 0
Post image

Pakistan's #APT36 / #TransparentTribe targets Indian Govt. with 'NIC eEmail Services' phishing campaign. Stay vigilant against sophisticated cyber threats. #CyberSecurity #Phishing #APT Link: thedailytechfeed.com/pakistani-cy...

0 0 0 0
Preview
A Call to Action for Indian Network Operators: Weak Routing Security Is Fueling Cross-Border Cyber Attacks  - MANRS The path forward is clear—Indian networks must join MANRS and implement routing security best practices now.

Research from @gca.bsky.social shows #APT36 systematically abused ISP infrastructure to launch cyber operations against Indian targets in 2025.

Even modest improvements in routing security make it harder to sustain operations at scale.

Learn more and join #MANRS:
manrs.org/2025/09/indi...

1 0 0 0
Preview
AIDE Data on APT36: Regional Infrastructure Risks and Security Gaps - GCA | Global Cyber Alliance | Working to Eradicate Cyber Risk Exploring APT36 (Transparent Tribe), a believed Pakistani state-aligned group launching cyber operations against Indian targets.

In the lead-up to #APNIC60, we’re examining #APT36, a believed Pakistani state-aligned group launching cyber operations against Indian targets.

globalcyberalliance.org/aide-data-ap...

#threatintelligence #threatintel #cybersecurity #AIDE #research #malware #routingsecurity

3 1 0 0
Preview
Indian BOSS Linux Under Siege - APT36 Exploits Malicious .desktop Shortcuts APT36 BOSS Linux attack - The Pakistan-linked threat group APT36, also known as Transparent Tribe, has intensified its espionage efforts .

Indian BOSS Linux Under Siege – APT36 Exploits Malicious .desktop Shortcuts The Pakistan-linked threat group APT36, also known as Transparent Tribe, has intensified its espionage efforts against ...

#Cyber #Security #News #Linux #Malicious #APT36 #BOSS #Linux #attack

Origin | Interest | Match

0 0 0 0
Post image

Pakistani state-sponsored hackers, APT36, escalate cyberattacks on Indian government entities using advanced Linux malware. Vigilance and robust cybersecurity measures are imperative. #CyberSecurity #APT36 #India Link: thedailytechfeed.com/pakistani-st...

0 0 0 0