Hackers Deploy Pahalgam Attack-Themed Lures Against Indian Government Personnel

Indian Government and Defence personnel are the latest targets in a sophisticated cyber espionage campaign orchestrated by the Pakistan-linked APT group Transparent Tribe (APT36).

The Seqrite Labs APT team reports a surge in phishing attacks themed around the recent “Pahalgam Terror Attack” (April 22, 2025), with adversaries leveraging fake government domains and spear-phishing documents to harvest credentials and deploy remote access trojans.

Transparent Tribe launched their campaign within days of the incident, weaponizing the heightened sensitivity and official urgency associated with the Kashmir region.

Malicious PDFs-bearing names like “Action Points & Response by Govt Regarding Pahalgam Terror Attack.pdf” and “Report Update Regarding Pahalgam Terror Attack.pdf”-were created as early as April 24, 2025, and attributed to the author “Kalu Badshah”.

Pahalgam Attack
PDF in question

These documents masquerade as government reports or meeting notes and are often laced with embedded URLs redirecting recipients to convincing phishing pages impersonating legitimate Indian government portals.

One such domain, jkpolice[.]gov[.]in[.]kashmirattack[.]exposed, closely mimics the official Jammu & Kashmir Police site, seeking to harvest credentials of @gov.in and @nic.in account holders.

Attackers Accelerate Post-Terror Event Phishing Using Fake Government Domains

Investigations revealed the campaign’s agility, with multiple document variants crafted to bait targets with references to ongoing government responses, defense meetings, and high-profile communications, covering a broad spectrum from Ministry of Defence notices to DRDO meeting records and even diplomatic agendas.

Additionally, a PowerPoint add-in file (Report & Update Regarding Pahalgam Terror Attack.ppam) with embedded macros has been used to extract decoy documents and trigger payload delivery based on the victim’s Windows environment.

Pahalgam Attack
PowerPoint PPAM Dropper

The ultimate objective: deploy the well-known Crimson RAT, concealed under misleading filenames such as “WEISTT.jpg,” with internal identifiers crafted to evade detection.

For command and control, Crimson RAT leverages hardcoded C2 infrastructure, with an actual decoded endpoint at 93.127.133[.]58, supporting 22 different operational commands.

These functionalities range from system reconnaissance and file exfiltration to screenshot capture and persistence installation, providing ample flexibility for espionage and long-term foothold within targeted networks.

All observed RAT payloads share a compilation timestamp immediately predating the Pahalgam terror event, highlighting meticulous planning by the adversaries.

Domain infrastructure analysis shows that phishing domains were rapidly registered, with most coming online within 24-48 hours of document creation.

These domains impersonate Indian government, military, and research entities, and resolve to IPs associated with bulletproof hosting providers and ASNs previously tied to APT36 operations.

The overlap of geopolitical themes and advanced persistent threat tactics marks this operation as both an information operation and a cyber-espionage vector.

By exploiting the national sensitivities around Kashmir, attackers aim not just to breach systems but to fan misinformation, disrupt operations, and gather strategic intelligence.

The use of PDFs and Office add-ins for initial access, together with rapidly evolving lure documents, aligns with Transparent Tribe’s established playbook observed in previous campaigns targeting Indian government, military, and research sectors.

Recommended mitigations include rigorous attachment scanning, macro restrictions, strict network access controls, targeted user awareness training, and integration with up-to-date threat intelligence to proactively block identified IOCs.

Indicators of Compromise (IOC)

Indicator TypeValue
Phishing Hashesc4fb60217e3d43eac92074c45228506a, 172fff2634545cf59d59c179d139e0aa, 7b08580a4f6995f645a5bf8addbefa68, … (truncated)
Phishing Domainsjkpolice[.]gov[.]in[.]kashmirattack[.]exposed
iaf[.]nic[.]in[.]ministryofdefenceindia[.]org
email[.]gov[.]in[.]ministryofdefenceindia[.]org
email[.]gov[.]in[.]departmentofdefenceindia[.]link
email[.]gov[.]in[.]departmentofdefence[.]de
… (multiple more as per report)
Phishing URLshxxps://jkpolice[.]gov[.]in[.]kashmirattack[.]exposed/service/home/
hxxps://email[.]gov[.]in[.]ministryofdefenceindia[.]org/service/home/
PPAM Hashesd946e3e94fec670f9e47aca186ecaabe, e18c4172329c32d8394ba0658d5212c2, …
Crimson RAT Hashes026e8e7acb2f2a156f8afff64fd54066, fb64c22d37c502bde55b19688d40c803, …
C2 IPs93.127.133[.]58 (Ports – 1097, 17241, 19821, 21817, 23221, 27425)
104.129.27[.]14 (Ports – 8108, 16197, 19867, 28784, 30123)

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here