APT36 Hackers Launches Advanced Phishing Attacks Against Indian Defense Personnel

APT36 Hackers Launches Advanced Phishing Attacks Against Indian Defense Personnel
APT36 Hackers Launches Advanced Phishing Attacks Against Indian Defense Personnel

A new wave of highly targeted phishing campaigns orchestrated by APT36, also known as Transparent Tribe, has been detected against Indian defense personnel.

CYFIRMA researchers have revealed that the Pakistan-based cyber espionage group continues to escalate its offensive, utilizing refined social engineering and technical sophistication to breach sensitive Indian defense networks.

Sophisticated Campaign Uses Fake NIC Documents

The group’s latest operation leverages phishing emails that deliver malicious PDF documents, carefully crafted to mimic official communications from the National Informatics Centre (NIC).

APT36 Hackers
embedded PDF file

Once opened, these PDFs display a blurred background superimposed with a fake login button, goading recipients into believing they are accessing a protected government document.

Interaction with the button triggers a redirection to a malicious URL resembling legitimate NIC infrastructure, which subsequently delivers a ZIP archive packed with a deceptive executable file.

Technical analysis reveals the ZIP archive hosts an executable named in double-extension format (e.g., PO-003443125.pdf.exe) with a PDF icon, specifically designed to trick users on Windows systems, where known file extensions are hidden by default.

This executable initiates a series of sophisticated anti-analysis routines. Notably, it checks for the presence of debugging tools and virtual environments, terminating itself if analysis is detected a classic hallmark of advanced persistent threat (APT) operations seeking to evade scrutiny by researchers or automated sandbox systems.

Upon successful execution, the malware adopts a fileless or in-memory execution strategy by unpacking and running a script embedded within its executable resources.

The malware proceeds to conduct several credential and data theft operations, such as monitoring and exfiltrating keystrokes, stealing clipboard contents, and harvesting browser and email credentials.

It also enumerates local drives and leverages Windows API calls to manipulate its persistence and evade detection, including spawning seemingly legitimate system processes (e.g., svchost.exe) and leveraging DLL side-loading techniques.

Malware Exploits Windows Systems

The analysis further highlights APT36’s emphasis on establishing long-term access by hijacking execution flows, modifying registry keys, manipulating startup processes, and employing obfuscation techniques to avoid endpoint security solutions.

Their infrastructure infrastructure leverages recently registered domains, many hosted via Cloudflare to mask their origins and evade traditional network filters.

The detected domains and IPs show a pattern of rapid creation and cycling, suggesting a preference for short-lived campaign infrastructure to maximize impact and minimize attribution risk.

APT36 Hackers
malicious domains

This recent campaign demonstrates APT36’s evolving playbook, with a strategic focus on credential harvesting to enable deep infiltration and ongoing espionage within Indian defense environments.

The attack chain meticulously mirrors legitimate defense workflows, heightening the risk of successful compromise among targeted personnel.

Given the sophistication of these phishing campaigns, security experts recommend immediate action for the Indian defense sector, including deployment of advanced threat protection for email, strict handling and quarantining of suspicious attachments, and enforcement of multi-factor authentication on sensitive systems.

Enhanced user awareness training coupled with simulated phishing exercises are emphasized to prepare staff for social engineering tactics.

Network defenders are urged to maintain dynamic threat intelligence feeds, monitor for anomalous connections to known APT36 indicators, and deploy endpoint detection and response (EDR) solutions capable of identifying both file-based and fileless malware behaviors.

Periodic credential audits, robust password policies, and regular incident response drills are essential to minimize the threat posed by this active and credible adversary.

APT36’s campaign underscores the persistent threat posed by nation-state actors to critical sectors, highlighting the need for a multi-layered, adaptive cybersecurity posture that integrates technical controls, user vigilance, and proactive threat intelligence sharing.

Indicators of Compromise (IOC)

S.No Indicator Type Remarks
1 f03ac870cb91c00b51ddf29b6028d9ddf42477970eafa7c556e3a3d74ada25c9 SHA256 Hash Block
2 55b7e20e42b57a32db29ea3f65d0fd2b2858aaeb9307b0ebbcdad1b0fcfd8059 SHA256 Hash Block
3 55972edf001fd5afb1045bd96da835841c39fec4e3d47643e6a5dd793c904332 SHA256 Hash Block
4 SuperPrimeServices[.]com Domain Block
5 Advising-Receipts[.]com Domain Block
6 FunDay24[.]ru Domain Block
7 PO-003443125.pdf : 6ee3b0f4cb84e18751e7088043741e9a MD5 Hash Block
8 PO-003443125.pdf.7z : cdb9fb87dcb44d8f3040f4fb87d89508 MD5 Hash Block
9 PO-003443125.pdf.exe : 154f4cdcd4b822314293ad566d7255fa MD5 Hash Block
10 hXXps://superprimeservices[.]com/nishat/order/PO-003443125[.]pdf[.]7z URL Block
11 104[.]21[.]41[.]144 IP Address Monitor
12 188[.]114[.]97[.]7 IP Address Monitor
13 76[.]223[.]54[.]146 IP Address Monitor

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post APT36 Hackers Launches Advanced Phishing Attacks Against Indian Defense Personnel appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading