Pakistan-linked hackers target Indian government, universities in new spying campaign

A Pakistan-aligned hacker group has launched a new cyber-espionage campaign targeting Indian government, academic and strategic institutions, researchers have found.

The campaign has been attributed to APT36, also known as Transparent Tribe, a long-running threat actor accused of spying on Indian government bodies, military-linked organizations and universities.

Researchers at cybersecurity firm Cyfirma said the latest operation begins with spear-phishing emails carrying a ZIP archive containing a malicious file disguised as a PDF. Once opened, the file delivers two malware components, dubbed ReadOnly and WriteOnly.

The malware is designed to quietly embed itself on victims’ systems, adjusting its behavior based on which antivirus software is installed. According to Cyfirma, it can remotely control infected machines, exfiltrate data and carry out persistent surveillance — including taking screenshots, monitoring clipboard activity and enabling remote desktop access.

Researchers said the clipboard monitoring feature could also be used to steal or overwrite copied data, potentially allowing attackers to hijack cryptocurrency transactions.

“The analysed campaign reinforces the group’s long-term surveillance objectives rather than short-term financial or disruptive goals,” the researchers said, adding that the activity aligns with state-linked intelligence-gathering priorities.

While researchers have previously characterized Transparent Tribe as less technically advanced than some rival espionage groups, they have also noted its persistence and ability to adapt tactics over time.

Cyfirma said the latest campaign showed an evolution in APT36’s technical capabilities, including the abuse of trusted Windows components, deception through common file formats and multi-stage, fileless execution techniques.

APT36 has been active since at least 2013 and has been linked to cyber-espionage campaigns targeting government and military organizations in India and Afghanistan, as well as institutions in roughly 30 countries. 

The group also overlaps with another Pakistan-linked threat actor, Cosmic Leopard, which carried out a years-long espionage campaign against Indian government agencies and defence- and technology-related companies detected last year.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Nearly 480,000 impacted by Covenant Health data breach

Next Post

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

Related Posts

From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware

A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and Europe that are designed to deliver a Go-based implant known as GOVERSHELL. "The initially observed campaigns were tailored to the targets, and the messages purported to be sent by senior researchers and analysts from legitimate-sounding, completely
Read More

⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

It’s easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show that long-term, silent breaches are becoming the norm. The best defense now isn’t just patching fast, but watching smarter and staying alert for what you don’t expect. Here’s a quick look at this week’s top threats, new tactics, and security stories shaping
Read More