Transparent Tribe Targets Indian Government with Dual-Platform Malware Campaign
Summary
Hide ▲
Show ▼
APT36, also known as Transparent Tribe, is targeting both Windows and BOSS Linux systems in ongoing attacks against Indian government and defense entities. The campaign, active since June 2025, involves phishing emails delivering malicious .desktop files disguised as PDFs. The malware facilitates data exfiltration, persistent espionage access, and includes anti-debugging and anti-sandbox checks. The malware also targets the Kavach 2FA solution used by Indian government agencies. The attack leverages the .desktop file's 'Exec=' field to execute a sequence of shell commands that download and run a Go-based ELF payload. The payload establishes persistence through cron jobs and systemd services, and communicates with a C2 server via a WebSocket channel. The technique allows APT36 to evade detection by abusing a legitimate Linux feature that is not typically monitored for threats. The campaign demonstrates APT36's evolving tactics, becoming more evasive and sophisticated. The campaign uses dedicated staging servers for malware distribution, transitioning from cloud storage platforms. The malware includes multiple persistence methods and supports commands for file browsing, collection, and remote execution. The campaign is part of a broader trend of targeted activity by South and East Asian threat actors, reflecting a trend toward purpose-built malware and infrastructure. Indian government entities have been targeted in two campaigns codenamed Gopher Strike and Sheet Attack. Gopher Strike leveraged phishing emails to deliver PDF documents with a blurred image and a fake Adobe Acrobat Reader DC update dialog. The campaign uses server-side checks to prevent automated URL analysis tools from fetching the ISO file, ensuring delivery only to intended targets in India. The malicious payload is a Golang-based downloader called GOGITTER, which creates a VBScript file to fetch commands from C2 servers. GOGITTER sets up persistence using a scheduled task to run the VBScript file every 50 minutes. GOGITTER downloads a ZIP file from a private GitHub repository and executes a lightweight Golang-based backdoor called GITSHELLPAD. GITSHELLPAD polls the C2 server every 15 seconds for commands and supports six different commands including cd, run, upload, and download. The results of command execution are stored in a file called "result.txt" and uploaded to the GitHub account. The threat actor also downloads RAR archives containing utilities to gather system information and drop GOSHELL, a bespoke Golang-based loader. GOSHELL's size was artificially inflated to approximately 1 gigabyte to evade detection by antivirus software. GOSHELL only executes on specific hostnames by comparing the victim's hostname against a hard-coded list. APT36 and SideCopy are launching cross-platform RAT campaigns against Indian entities using malware families like Geta RAT, Ares RAT, and DeskRAT. The campaigns use phishing emails with malicious attachments or download links to deliver the malware, which provides persistent remote access, system reconnaissance, data collection, and command execution. Geta RAT supports various commands including system information collection, process enumeration, credential gathering, and file operations. Ares RAT is a Python-based RAT that can run commands issued by the threat actor. DeskRAT is delivered via a rogue PowerPoint Add-In file with embedded macros. The campaigns target Indian defense, government, and strategic sectors, demonstrating a well-resourced, espionage-focused threat actor deliberately targeting these sectors through defense-themed lures, impersonated official documents, and regionally trusted infrastructure.
Timeline
-
27.01.2026 18:45 2 articles · 15d ago
APT36 Launches Gopher Strike and Sheet Attack Campaigns
Indian government entities have been targeted in two campaigns codenamed Gopher Strike and Sheet Attack. Gopher Strike leveraged phishing emails to deliver PDF documents with a blurred image and a fake Adobe Acrobat Reader DC update dialog. The campaign uses server-side checks to prevent automated URL analysis tools from fetching the ISO file, ensuring delivery only to intended targets in India. The malicious payload is a Golang-based downloader called GOGITTER, which creates a VBScript file to fetch commands from C2 servers. GOGITTER sets up persistence using a scheduled task to run the VBScript file every 50 minutes. GOGITTER downloads a ZIP file from a private GitHub repository and executes a lightweight Golang-based backdoor called GITSHELLPAD. GITSHELLPAD polls the C2 server every 15 seconds for commands and supports six different commands including cd, run, upload, and download. The results of command execution are stored in a file called "result.txt" and uploaded to the GitHub account. The threat actor also downloads RAR archives containing utilities to gather system information and drop GOSHELL, a bespoke Golang-based loader. GOSHELL's size was artificially inflated to approximately 1 gigabyte to evade detection by antivirus software. GOSHELL only executes on specific hostnames by comparing the victim's hostname against a hard-coded list. APT36 and SideCopy are launching cross-platform RAT campaigns against Indian entities using malware families like Geta RAT, Ares RAT, and DeskRAT. The campaigns use phishing emails with malicious attachments or download links to deliver the malware, which provides persistent remote access, system reconnaissance, data collection, and command execution.
Show sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
23.10.2025 18:30 4 articles · 3mo ago
APT36 Uses DeskRAT for Enhanced Command and Control
The malware is a Golang-based remote access Trojan (RAT) called DeskRAT. It can upload and execute files remotely, collect sensitive files under 100MB, and maintain persistence through multiple Linux-specific techniques. The campaign uses a new, sophisticated command interface for managing compromised systems, allowing real-time monitoring, file collection, and remote access across infected hosts. The malware includes anti-debugging and anti-sandbox checks, and uses WebSocket for C2 communication. The campaign reflects a trend toward purpose-built malware and infrastructure, with frequent operations and a high delivery cadence. APT36 and SideCopy are launching cross-platform RAT campaigns against Indian entities using malware families like Geta RAT, Ares RAT, and DeskRAT. The campaigns use phishing emails with malicious attachments or download links to deliver the malware, which provides persistent remote access, system reconnaissance, data collection, and command execution.
Show sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
25.08.2025 11:13 4 articles · 5mo ago
APT36 Targets Indian Entities with Linux .desktop File Malware
The campaign now targets both Windows and BOSS Linux systems. The malware uses a shell script to download and execute a hex-encoded file from an attacker-controlled server and opens a decoy PDF to deceive the user. The malware performs system reconnaissance and includes anti-debugging and anti-sandbox checks. It deploys a known Transparent Tribe backdoor called Poseidon and targets the Kavach 2FA solution used by Indian government agencies. The campaign uses typo-squatted domains and infrastructure hosted on Pakistan-based servers. The campaign uses dedicated staging servers for malware distribution, transitioning from cloud storage platforms. The malware includes multiple persistence methods and supports commands for file browsing, collection, and remote execution. APT36 and SideCopy are launching cross-platform RAT campaigns against Indian entities using malware families like Geta RAT, Ares RAT, and DeskRAT. The campaigns use phishing emails with malicious attachments or download links to deliver the malware, which provides persistent remote access, system reconnaissance, data collection, and command execution.
Show sources
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
22.08.2025 21:35 6 articles · 5mo ago
APT36 Targets Indian Entities with Linux .desktop File Malware
The campaign began in June 2025 and primarily targeted systems running the Bharat Operating System Solutions (BOSS) Linux distribution. The malware uses dedicated staging servers to distribute malware and includes functions suggesting the use of large language models (LLMs) in its development. The operation coincided with protests in Ladakh and New Delhi in August and September 2025, which were used as lures. The campaign reflects a trend toward purpose-built malware and infrastructure. The campaign targets Indian government entities with a Golang-based malware known as DeskRAT. The malware uses multiple persistence methods, including systemd services, cron jobs, and autostart configurations. APT36 and SideCopy are launching cross-platform RAT campaigns against Indian entities using malware families like Geta RAT, Ares RAT, and DeskRAT. The campaigns use phishing emails with malicious attachments or download links to deliver the malware, which provides persistent remote access, system reconnaissance, data collection, and command execution.
Show sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
Information Snippets
-
APT36 is targeting government and defense entities in India with a new malware campaign.
First reported: 22.08.2025 21:353 sources, 6 articlesShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The attacks began on August 1, 2025, and are ongoing.
First reported: 22.08.2025 21:353 sources, 6 articlesShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware is delivered via phishing emails containing ZIP archives with malicious .desktop files.
First reported: 22.08.2025 21:353 sources, 6 articlesShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The .desktop files are disguised as PDF documents and execute a bash command to download and run a payload.
First reported: 22.08.2025 21:353 sources, 6 articlesShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The payload is a Go-based ELF executable that performs espionage functions.
First reported: 22.08.2025 21:353 sources, 6 articlesShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware establishes persistence using cron jobs and systemd services.
First reported: 22.08.2025 21:353 sources, 6 articlesShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
Communication with the C2 server is conducted through a bi-directional WebSocket channel.
First reported: 22.08.2025 21:353 sources, 6 articlesShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The attack technique exploits the 'Exec=' field in .desktop files to run shell commands.
First reported: 22.08.2025 21:353 sources, 5 articlesShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware also uses fields like 'Terminal=false' and 'X-GNOME-Autostart-enabled=true' to hide its activity and ensure persistence.
First reported: 22.08.2025 21:351 source, 1 articleShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
-
The campaign demonstrates APT36's evolving tactics, becoming more evasive and sophisticated.
First reported: 22.08.2025 21:352 sources, 5 articlesShow sources
- APT36 hackers abuse Linux .desktop files to install malware in new attacks — www.bleepingcomputer.com — 22.08.2025 21:35
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign targets both Windows and BOSS Linux systems.
First reported: 25.08.2025 11:131 source, 4 articlesShow sources
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware uses a shell script to download and execute a hex-encoded file from an attacker-controlled server.
First reported: 25.08.2025 11:131 source, 4 articlesShow sources
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware opens a decoy PDF hosted on Google Drive to deceive the user.
First reported: 25.08.2025 11:132 sources, 5 articlesShow sources
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware performs system reconnaissance and includes anti-debugging and anti-sandbox checks.
First reported: 25.08.2025 11:132 sources, 4 articlesShow sources
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware deploys a known Transparent Tribe backdoor called Poseidon.
First reported: 25.08.2025 11:132 sources, 5 articlesShow sources
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware targets the Kavach 2FA solution used by Indian government agencies.
First reported: 25.08.2025 11:131 source, 4 articlesShow sources
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign uses typo-squatted domains and infrastructure hosted on Pakistan-based servers.
First reported: 25.08.2025 11:132 sources, 5 articlesShow sources
- Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing — thehackernews.com — 25.08.2025 11:13
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign began in June 2025.
First reported: 23.10.2025 18:302 sources, 4 articlesShow sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign primarily targeted systems running the Bharat Operating System Solutions (BOSS) Linux distribution.
First reported: 23.10.2025 18:302 sources, 4 articlesShow sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign used dedicated staging servers to distribute malware.
First reported: 23.10.2025 18:302 sources, 4 articlesShow sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware is a Golang-based remote access Trojan (RAT) called DeskRAT.
First reported: 23.10.2025 18:302 sources, 4 articlesShow sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware can upload and execute files remotely and collect sensitive files under 100MB.
First reported: 23.10.2025 18:302 sources, 4 articlesShow sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware's code includes functions suggesting possible use of large language models (LLMs) in its development.
First reported: 23.10.2025 18:302 sources, 4 articlesShow sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The operation coincided with protests in Ladakh and New Delhi in August and September 2025.
First reported: 23.10.2025 18:302 sources, 4 articlesShow sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign used a new, sophisticated command interface for managing compromised systems.
First reported: 23.10.2025 18:302 sources, 4 articlesShow sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign reflects a trend toward purpose-built malware and infrastructure.
First reported: 23.10.2025 18:302 sources, 4 articlesShow sources
- Pakistani-Linked Hacker Group Targets Indian Government — www.infosecurity-magazine.com — 23.10.2025 18:30
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign targets Indian government entities with a Golang-based malware known as DeskRAT.
First reported: 24.10.2025 17:001 source, 3 articlesShow sources
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware uses multiple persistence methods, including systemd services, cron jobs, and autostart configurations.
First reported: 24.10.2025 17:001 source, 3 articlesShow sources
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
DeskRAT supports commands for file browsing, collection, and remote execution.
First reported: 24.10.2025 17:001 source, 3 articlesShow sources
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign uses dedicated staging servers for malware distribution, transitioning from cloud storage platforms.
First reported: 24.10.2025 17:001 source, 3 articlesShow sources
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware includes anti-debugging and anti-sandbox checks, and uses WebSocket for C2 communication.
First reported: 24.10.2025 17:001 source, 3 articlesShow sources
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign reflects a trend toward purpose-built malware and infrastructure, with frequent operations and a high delivery cadence.
First reported: 24.10.2025 17:001 source, 3 articlesShow sources
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware has variants for both Windows and Linux systems, with different communication methods and functionalities.
First reported: 24.10.2025 17:001 source, 3 articlesShow sources
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign is part of a broader trend of targeted activity by South and East Asian threat actors.
First reported: 24.10.2025 17:001 source, 3 articlesShow sources
- APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign — thehackernews.com — 24.10.2025 17:00
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
Indian government entities have been targeted in two campaigns codenamed Gopher Strike and Sheet Attack.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
Gopher Strike leveraged phishing emails to deliver PDF documents with a blurred image and a fake Adobe Acrobat Reader DC update dialog.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaign uses server-side checks to prevent automated URL analysis tools from fetching the ISO file, ensuring delivery only to intended targets in India.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malicious payload is a Golang-based downloader called GOGITTER, which creates a VBScript file to fetch commands from C2 servers.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
GOGITTER sets up persistence using a scheduled task to run the VBScript file every 50 minutes.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
GOGITTER downloads a ZIP file from a private GitHub repository and executes a lightweight Golang-based backdoor called GITSHELLPAD.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
GITSHELLPAD polls the C2 server every 15 seconds for commands and supports six different commands including cd, run, upload, and download.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The results of command execution are stored in a file called "result.txt" and uploaded to the GitHub account.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The threat actor also downloads RAR archives containing utilities to gather system information and drop GOSHELL, a bespoke Golang-based loader.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
GOSHELL's size was artificially inflated to approximately 1 gigabyte to evade detection by antivirus software.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
GOSHELL only executes on specific hostnames by comparing the victim's hostname against a hard-coded list.
First reported: 27.01.2026 18:451 source, 2 articlesShow sources
- Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities — thehackernews.com — 27.01.2026 18:45
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
APT36 and SideCopy are launching cross-platform RAT campaigns against Indian entities.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaigns use malware families like Geta RAT, Ares RAT, and DeskRAT.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
SideCopy operates as a subdivision of Transparent Tribe.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
Phishing emails with malicious attachments or download links are used to deliver the malware.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware families provide persistent remote access, system reconnaissance, data collection, and command execution.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
Geta RAT supports various commands including system information collection, process enumeration, credential gathering, and file operations.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
Ares RAT is a Python-based RAT that can run commands issued by the threat actor.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
DeskRAT is delivered via a rogue PowerPoint Add-In file with embedded macros.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The campaigns target Indian defense, government, and strategic sectors.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
-
The malware families are optimized for stealth, persistence, and long-term access.
First reported: 11.02.2026 16:521 source, 1 articleShow sources
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities — thehackernews.com — 11.02.2026 16:52
Similar Happenings
SSHStalker Linux Botnet Uses IRC for C2 Communications
A new Linux botnet named SSHStalker has been documented, utilizing the outdated IRC protocol for command-and-control (C2) operations. The botnet employs classic IRC mechanics, including multiple C-based bots and multi-server/channel redundancy, prioritizing resilience and scale over stealth. It achieves initial access through automated SSH scanning and brute-forcing, using a Go binary disguised as nmap. Once infected, hosts are used to scan for additional SSH targets, and the botnet includes exploits for 16 CVEs targeting older Linux kernel versions. The botnet also performs AWS key harvesting, website scanning, and includes cryptomining kits and DDoS capabilities. Notably, SSHStalker maintains persistent access without immediate follow-on post-exploitation behavior, suggesting it may be used for staging, testing, or strategic access retention. The threat actor is suspected to be of Romanian origin, with operational overlaps with the hacking group Outlaw (aka Dota).
VoidLink Malware Framework Targets Cloud and Container Environments
VoidLink is a Linux-based command-and-control (C2) framework capable of long-term intrusion across cloud and enterprise environments. The malware generates implant binaries designed for credential theft, data exfiltration, and stealthy persistence on compromised systems. VoidLink combines multi-cloud targeting with container and kernel awareness in a single Linux implant, fingerprinting environments across major cloud providers and adjusting its behavior based on what it finds. The implant harvests credentials from environment variables, configuration files, and metadata APIs, and profiles security controls, kernel versions, and container runtimes before activating additional modules. VoidLink employs a modular plugin-based architecture that loads functionality as needed, including credential harvesting, environment fingerprinting, container escape, Kubernetes privilege escalation, and kernel-level stealth. The malware uses AES-256-GCM over HTTPS for encrypted C2 traffic, designed to resemble normal web activity. VoidLink stands out for its apparent development using a large language model (LLM) coding agent with limited human review, as indicated by unusual development artifacts such as structured "Phase X:" labels, verbose debug logs, and documentation left inside the production binary. The research concludes that VoidLink is not a proof-of-concept but an operational implant with live infrastructure, highlighting how AI-assisted development is lowering the barrier to producing functional, modular, and hard-to-detect malware.
Bloody Wolf APT Expands Operations to Russia and Central Asia Using NetSupport RAT
The Bloody Wolf APT group, also tracked as Stan Ghouls, has expanded its operations to include Russia, targeting government entities, logistics companies, medical facilities, and educational institutions. The campaign has infected about 50 victims in Uzbekistan and 10 devices in Russia, with additional infections identified in Kazakhstan, Turkey, Serbia, and Belarus. The group has shifted from traditional malware to using legitimate remote-access software, specifically NetSupport RAT, deployed via Java-based delivery methods. The campaign involves sophisticated social engineering tactics, including impersonating government ministries and using geofenced infrastructure to deliver malicious payloads. The group's activities have been ongoing since at least June 2025, with a notable increase in operations by October 2025. The campaign has targeted finance, government, and information technology (IT) sectors. The shift to legitimate remote-administration tools indicates an evolution in the group's tactics to evade detection and blend into normal IT activity. The group has also expanded its malware arsenal to target IoT devices, with Mirai botnet payloads staged on associated infrastructure.
Iranian APT Phishing Campaign Targets US Think Tanks
Between June and August 2025, an Iranian advanced persistent threat (APT) group, tentatively named UNK_SmudgedSerpent, conducted targeted phishing attacks against prominent US think tanks and policy experts. The campaign impersonated influential figures in US foreign policy, including Suzanne Maloney and Patrick Clawson, to steal credentials and deploy remote monitoring and management (RMM) software. The group's tactics, techniques, and procedures (TTPs) overlapped with multiple known Iranian APTs, suggesting possible reorganization or collaboration within Iranian cyber operations. The phishing attempts involved impersonating key figures in US policy discussions on Iran, using tailored emails to lure targets into clicking malicious links. The group used a combination of techniques reminiscent of multiple Iranian APTs, including TA453 (Charming Kitten) and TA455 (Smoke Sandstorm), and deployed RMM software, a tactic previously associated with TA450 (MuddyWater). The campaign targeted over 20 subject matter experts at a U.S.-based think tank and used decoy documents and zip files containing RMM installers. The attackers also impersonated prominent U.S. foreign policy figures associated with think tanks like Brookings Institution and Washington Institute, and used spoofed login pages to harvest Microsoft account credentials. The group's activity was observed to have paused, but concerns persist due to the tactical overlap with known Iranian APTs. The group's tactics and infrastructure suggest possible personnel movement or shared infrastructure procurement between Iranian contracting outfits.
Russian Threat Actors Target Ukrainian and Polish Organizations with Data-Wiping Malware and LotL Tactics
Russian threat actors, specifically the Sandworm group, have targeted Ukrainian organizations and Poland's power sector using living-off-the-land (LotL) tactics and deploying data-wiping malware. The attacks, which began in June 2025, involved minimal malware to reduce detection and included the use of web shells and legitimate tools for reconnaissance and data theft. The threat actors exploited unpatched vulnerabilities to deploy web shells on public-facing servers, gaining initial access. They then used various tactics, including PowerShell commands, scheduled tasks, and legitimate software, to evade detection and perform reconnaissance. The attacks were characterized by the use of legitimate tools and minimal malware, demonstrating the actors' deep knowledge of Windows native tools. In addition to LotL tactics, Sandworm deployed multiple data-wiping malware families in June and September 2025, targeting Ukraine's education, government, and grain sectors. The grain sector, a vital economic sector, was targeted to disrupt Ukraine's war economy. The data-wiping malware used included ZeroLot and Sting, with initial access achieved by UAC-0099, who then transferred access to APT44 for wiper deployment. The activity is confirmed to be of Russian origin, with specific attribution to the Sandworm group. In December 2025, Sandworm targeted Poland's power sector with a new wiper malware called DynoWiper, aiming to disrupt the energy infrastructure. The attack, which occurred on December 29 and 30, 2025, targeted two combined heat and power (CHP) plants and a system managing renewable energy sources. The attack was unsuccessful in causing disruption, and Polish authorities attributed it to Russian services. The attack coincided with the tenth anniversary of Sandworm's 2015 attack on Ukraine's power grid. A new Russia-aligned threat activity cluster, InedibleOchotense, impersonated ESET in phishing attacks targeting Ukrainian entities starting in May 2025. This campaign involved sending spear-phishing emails and Signal text messages containing links to trojanized ESET installers, which delivered the Kalambur backdoor. InedibleOchotense is linked to the Sandworm (APT44) hacking group and has been observed conducting destructive campaigns in Ukraine, including the deployment of wiper malware ZEROLOT and Sting. Another Russia-aligned threat actor, RomCom, launched spear-phishing campaigns in mid-July 2025 exploiting a WinRAR vulnerability (CVE-2025-8088) targeting various sectors in Europe and Canada. RomCom also targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. The activity has been attributed with medium-to-high confidence to Unit 29155 of Russia's Main Directorate of the General Staff of the Armed Forces of the Russian Federation, also known as GRU. The targeted entity had worked for a city with close ties to Ukraine in the past. The ESET report noted that other Russian-aligned APT groups also maintained their focus on Ukraine and countries with strategic ties to Ukraine, while also expanding their operations to European entities. Gamaredon remained the most active APT group targeting Ukraine, with a noticeable increase in intensity and frequency of its operations during the reported period. Gamaredon selectively deployed one of Turla’s backdoors, indicating a rare instance of cooperation between Russia-aligned APT groups. Gamaredon’s toolset continued to evolve, incorporating new file stealers or tunneling services. The cyber attack on the Polish power grid in December 2025 was attributed with medium confidence to a Russian state-sponsored hacking group known as ELECTRUM. The attack targeted distributed energy resources (DERs) and affected communication and control systems at combined heat and power (CHP) facilities and systems managing renewable energy systems. ELECTRUM and KAMACITE share overlaps with the Sandworm cluster, with KAMACITE focusing on initial access and ELECTRUM conducting operations that bridge IT and OT environments. The attackers gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site. The attack was opportunistic and rushed, with the hackers attempting to inflict as much damage as possible by wiping Windows-based devices and resetting configurations. The majority of the equipment targeted was related to grid safety and stability monitoring. The coordinated attack on Poland's power grid in late December targeted multiple distributed energy resource (DER) sites across the country, including combined heat and power (CHP) facilities and wind and solar dispatch systems. Although the attacker compromised operational technology (OT) systems damaging "key equipment beyond repair," they failed to disrupt power, totaling 1.2 GW or 5% of Poland’s energy supply. Based on public reports, there are at least 12 confirmed affected sites. However, researchers at Dragos, a critical industrial infrastructure (OT) and control systems (ICS) security company say that the number is approximately 30. Dragos attributes the attack with moderate confidence to a Russian threat actor it tracks as Electrum, which, although it overlaps with Sandworm (APT44), the researchers underline that it is a distinct activity cluster. Electrum targeted exposed and vulnerable systems involved in dispatch and grid-facing communication, remote terminal units (RTUs), network edge devices, monitoring and control systems, and Windows-based machines at DER sites. Electrum successfully disabled communications equipment at multiple sites, resulting in a loss of remote monitoring and control, but power generation on the units continued without interruption. Certain OT/ICS devices were disabled, and their configurations were corrupted beyond recovery, while Windows systems at the sites were wiped. Even if the attacks had been successful in cutting the power, the relatively narrow targeting scope wouldn’t have been enough to cause a nationwide blackout in Poland. However, they could have caused significant destabilization of the system frequency. "Such frequency deviations have caused cascading failures in other electrical systems, including the 2025 Iberian grid collapse," the researchers say. CERT Polska revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) in Poland on December 29, 2025. The attacks were attributed to a threat cluster dubbed Static Tundra, which is linked to Russia's Federal Security Service's (FSB) Center 16 unit. The attacks had a purely destructive objective but did not affect the ongoing production of electricity or the heat supply to end users. The attackers gained access to the internal network of power substations associated with a renewable energy facility to carry out reconnaissance and disruptive activities, including damaging the firmware of controllers, deleting system files, or launching custom-built wiper malware codenamed DynoWiper. In the intrusion aimed at the CHP, the adversary engaged in long-term data theft dating back to March 2025, enabling them to escalate privileges and move laterally across the network. The attackers' attempts to detonate the wiper malware were unsuccessful. The targeting of the manufacturing sector company is believed to be opportunistic, with the threat actor gaining initial access via a vulnerable Fortinet perimeter device. At least four different versions of DynoWiper have been discovered to date. The wiper's functionality involves initializing a pseudorandom number generator (PRNG) called Mersenne Twister, enumerating files and corrupting them using the PRNG, and deleting files. The malware does not have a persistence mechanism, a way to communicate with a command-and-control (C2) server, or execute shell commands, and it does not attempt to hide the activity from security programs. The attack targeting the manufacturing sector company involved the use of a PowerShell-based wiper dubbed LazyWiper that scripts overwrites files on the system with pseudorandom 32-byte sequences to render them unrecoverable. The malware used in the incident involving renewable energy farms was executed directly on the HMI machine. In the CHP plant and the manufacturing sector company, the malware was distributed within the Active Directory domain via a PowerShell script executed on a domain controller. The attacker used credentials obtained from the on-premises environment in attempts to gain access to cloud services, downloading selected data from services such as Exchange, Teams, and SharePoint. The attacker was particularly interested in files and email messages related to OT network modernization, SCADA systems, and technical work carried out within the organizations.