Monday, April 28, 2025
Homecyber securityPakistani APT Hackers Attacking Indian Govt Entities With Weaponized Shortcut Files

Pakistani APT Hackers Attacking Indian Govt Entities With Weaponized Shortcut Files

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts at Seqrite Labs have reported a surge in cyberattacks against Indian government entities.

These attacks have been attributed to Pakistani Advanced Persistent Threat (APT) groups, which have been intensifying their malicious activities.

Attack Methods

The recent campaigns uncovered by Seqrite Labs’ APT team reveal a sophisticated level of cyber warfare.

- Advertisement - Google News

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

The Pakistani-linked APT group SideCopy has been particularly active, deploying its commonly used AllaKore Remote Access Trojan (RAT) in three separate campaigns.

Attack Chain of SideCopy
Attack Chain of SideCopy

In each of these campaigns, two instances of the RAT were used simultaneously, showcasing the group’s aggressive tactics.

Simultaneously, Transparent Tribe (APT36), the parent group of SideCopy, has been consistently utilizing the Crimson RAT.

However, they have modified their approach by encoding or packing the RAT differently to evade detection.

Targets

The primary targets of these cyberattacks are Indian defense and government entities.

SideCopy and APT36 have been persistent in their efforts to infiltrate these sectors since at least 2019.

The decoy files used in previous campaigns in February-March 2023 have been observed. 

“Grant_of_Risk_and_HardShip_Allowances_Mar_24.pdf.” As the name suggests, it is an advisory from 2022 on allowance grants to Army officers under India’s Ministry of Defence.

Decoy Files
Decoy Files

Their arsenal is not limited to AllaKore and Crimson RATs but includes other malicious tools such as Ares RAT, Action RAT, Reverse RAT, and Margulas RAT.

The impact of these cyberattacks is significant, as they compromise the security and integrity of critical government systems.

The persistent targeting of these entities threatens national security and puts sensitive data at risk of being exploited.

Countermeasures

In response to these escalating threats, Indian cybersecurity forces are urged to strengthen their defenses and remain vigilant.

This includes updating security protocols, conducting regular system checks, and training personnel to effectively recognize and respond to cyber threats.

As geopolitical tensions continue influencing the cyber threat landscape, India remains a prime target for APT groups.

Seqrite Labs’ recent findings underscore the need for robust cybersecurity measures to protect against these sophisticated and persistent threats.

Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...