Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
APT36 Targets Indian Government with Golang DeskRAT Malware Campaign
Advertisements

A Pakistan-nexus threat actor, identified as APT36, also known by the alias Transparent Tribe, has been observed executing a series of spear-phishing attacks. These campaigns specifically targeted Indian government entities, utilizing a Golang-based malware known as DeskRAT. This state-sponsored hacking group has a documented history of activity dating back to at least 2013, consistently focusing on cyber espionage operations.

APT36 Campaign Attribution and Timeline

The recent malicious activity was meticulously observed and documented by Sekoia during August and September 2025. Sekoia’s analysis directly attributed these operations to Transparent Tribe (APT36). This specific campaign builds upon and is consistent with a prior campaign that was disclosed by CYFIRMA in August 2025, highlighting a sustained and ongoing threat. The use of DeskRAT in these attacks signifies an evolving toolkit for the threat actor.

Sophisticated Attack Chain and Malware Delivery

The attack chains commenced with the delivery of spear-phishing emails. These emails were crafted to either contain a malicious ZIP file attachment directly or to provide a link directing targets to an archive hosted on legitimate cloud services, such as Google Drive. Once downloaded and accessed, the ZIP file contained a malicious Desktop file. This Desktop file was engineered to embed specific commands: one command was designed to display a decoy PDF document, identified as “CDS_Directive_Armed_Forces.pdf,” which would open using Mozilla Firefox. Simultaneously, another command within the Desktop file was executed to launch the primary DeskRAT payload. Both the decoy PDF and the critical main payload were retrieved from an external server, precisely “modgovindia[.]com,” ensuring the full execution of the attack. This dual-purpose delivery method allowed APT36 to maintain stealth while deploying its cyber espionage tools against Indian government targets.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading