Particle.news

Download on the App Store

Transparent Tribe Uses Linux Desktop Shortcuts to Plant Go Backdoor in Ongoing India Espionage

New analyses tie the activity to APT36, detailing booby-trapped desktop shortcuts that install a Go backdoor on Indian government systems.

Pakistan India APT
Image

Overview

  • CYFIRMA, CloudSEK and Hunt.io report an active August campaign that targets BOSS Linux and Windows users in Indian government and defense via spear‑phishing meeting notices.
  • Malicious .desktop files disguised as PDFs execute a shell script that fetches a hex‑encoded payload from securestore[.]cv, decodes it to an ELF binary, and displays a decoy PDF hosted on Google Drive.
  • The deployed Go-based malware contains a hardcoded command‑and‑control server at modgovindia[.]space:4000 and is engineered for stealthy remote control and data exfiltration.
  • Persistence is achieved through autostart, cron jobs and systemd abuse, with samples showing statically linked ELF binaries and anti‑analysis checks noted by researchers.
  • Hunt.io attributes the downstream access to a Transparent Tribe backdoor known as Poseidon, while related activity uses typo‑squatted domains to harvest credentials and Kavach 2FA codes on Pakistan‑hosted infrastructure.