Pakistan-linked hackers target Indian government, universities in new spying campaign

A Pakistan-aligned hacker group has launched a new cyber-espionage campaign targeting Indian government, academic and strategic institutions, researchers have found.

The campaign has been attributed to APT36, also known as Transparent Tribe, a long-running threat actor accused of spying on Indian government bodies, military-linked organizations and universities.

Researchers at cybersecurity firm Cyfirma said the latest operation begins with spear-phishing emails carrying a ZIP archive containing a malicious file disguised as a PDF. Once opened, the file delivers two malware components, dubbed ReadOnly and WriteOnly.

The malware is designed to quietly embed itself on victims’ systems, adjusting its behavior based on which antivirus software is installed. According to Cyfirma, it can remotely control infected machines, exfiltrate data and carry out persistent surveillance — including taking screenshots, monitoring clipboard activity and enabling remote desktop access.

Researchers said the clipboard monitoring feature could also be used to steal or overwrite copied data, potentially allowing attackers to hijack cryptocurrency transactions.

“The analysed campaign reinforces the group’s long-term surveillance objectives rather than short-term financial or disruptive goals,” the researchers said, adding that the activity aligns with state-linked intelligence-gathering priorities.

While researchers have previously characterized Transparent Tribe as less technically advanced than some rival espionage groups, they have also noted its persistence and ability to adapt tactics over time.

Cyfirma said the latest campaign showed an evolution in APT36’s technical capabilities, including the abuse of trusted Windows components, deception through common file formats and multi-stage, fileless execution techniques.

APT36 has been active since at least 2013 and has been linked to cyber-espionage campaigns targeting government and military organizations in India and Afghanistan, as well as institutions in roughly 30 countries. 

The group also overlaps with another Pakistan-linked threat actor, Cosmic Leopard, which carried out a years-long espionage campaign against Indian government agencies and defence- and technology-related companies detected last year.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Nearly 480,000 impacted by Covenant Health data breach

Next Post

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

Related Posts

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to
Read More

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

This week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next. Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That’s the point. Entry is becoming less visible while impact
Read More

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services (IIS) servers located across Asia, but with a specific focus on targets in Thailand and Vietnam. The scale of the campaign is currently
Read More