APT36 Hackers Exploit Malicious PDF Files to Attack Indian Railways, Oil, and Government Networks

Pakistan-linked threat group APT36, also known as Transparent Tribe, has significantly evolved its cyberattack playbook beyond traditional military targets to include critical Indian infrastructure sectors.

Security researchers have uncovered a sophisticated campaign that exploits .desktop files disguised as PDF documents to infiltrate Indian railways, oil and gas infrastructure, and government networks, marking a dangerous expansion of the group’s operational scope.

Advanced Infection Chains Using Desktop Files

APT36’s latest campaign employs two distinct attack variants, both utilizing .desktop files masquerading as legitimate PDF documents.

These files execute malicious scripts in the background while displaying decoy content to victims.

Initial indicators shared by researcher Sathwik Ram Prakki

The first variant uses a single command and control server at 209.38.203.53, while the second employs redundant infrastructure with servers at 165.232.114.63 and 165.22.251.224 to ensure operational resilience.

The attack begins when victims open what appears to be a harmless PDF document. Behind the scenes, the .desktop file executes scripts that download malware payloads, establish persistence through cron jobs, and clean up traces of the infection.

The malicious files are given names like p7zip-full, tcl-8.7, emacs-bin, and crond-98 to blend in with legitimate system files.

Poseidon Backdoor Deployment

Following initial infection, APT36 deploys the Poseidon backdoor, built on the open-source Mythic command and control framework and written in Go.

This cross-platform tool enables long-term access, credential harvesting, and lateral movement within compromised networks.

Security researchers identified command and control servers at 178.128.204.138 and 64.227.189.57, both hosted by DigitalOcean, with infrastructure spanning Germany and India.

The Poseidon backdoor’s modular design allows attackers to load functionality as needed, making it particularly dangerous for critical infrastructure environments.

Analysis confirmed that port 7443 is actively running Mythic C2 services, with one server located in Karnataka, India, suggesting the threat actors are strategically positioning infrastructure close to their targets.

Mythic C2 detection on 64.227.189.57

Massive Phishing Infrastructure Exposed

Researchers discovered over 100 phishing domains in this campaign, many impersonating Indian government organizations and hosted by AlexHost.

The domains use familiar-looking subdomains combined with misleading top-level domains such as .report, .support, .digital, and .link. Examples include the Indian Army. nic.in/nomination-drdo-report, mod.gov.in/defence-personnel-support, and iaf.nic.in/ministry-of-defence-india.org.

Checking phishing domain using URLScan

The phishing campaign first emerged through domains registered in early July 2025, with live infrastructure observed as of mid-July, indicating ongoing and active targeting.

The consistent use of domain formats, content templates, and hosting providers points to centralized control by APT36.

Security researchers have linked this infrastructure expansion to APT36’s broader strategy of targeting Indian critical sectors.

The group has previously demonstrated sophistication in credential harvesting operations. It continues to refine its techniques to avoid detection while maintaining persistent access to sensitive networks across multiple sectors of India’s national infrastructure.

Indicators of Compromises (IOCs):

MD5 HashDescription
e354cf4cc4177e019ad236f8b241ba3c.desktop file used by APT36 for persistence and evasion.
76e9ff3c325de4f2d52f9881422a88cbMalicious .desktop file with scripts for system profiling.
65167974b397493fce320005916a13e9APT36 launcher disguised as a document shortcut.
6065407484f1e22e814dfa00bd1fae06APT36 desktop file with evasion techniques.
5c71c683ff55530c73477e0ff47a1899Masquerading file executing payloads on Linux.
8d46a7e4a800d15e31fb0aa86d4d7b7fPhishing lure with backdoor and anti-analysis.
589cf2077569b95178408f364a1aa721.desktop file used for initial compromise and evasion.
b3f57fe1a541c364a5989046ac2cb9c5Shortcut used by APT36 for Linux targeting and payload delivery.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here