Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Transparent Tribe Targets India’s Tech Startups

Transparent Tribe Targets India’s Tech Startups

Posted on February 6, 2026 By CWS

India’s technology sector is facing a new cyber threat as the hacking group known as Transparent Tribe turns its attention towards the country’s burgeoning startup ecosystem. Previously focused on government entities, the Pakistan-based group is now targeting firms in cybersecurity and intelligence, using sophisticated tactics to breach defenses.

Shift in Target: From Government to Startups

Known in the cybersecurity community as APT36, Transparent Tribe has been active since 2013. Their latest strategy involves deploying the Crimson RAT malware to infiltrate Indian startups. The group carefully crafts fake emails with malicious attachments, masquerading as legitimate documents, to deceive unsuspecting victims.

This shift was detected when researchers came across suspicious files uploaded from India. These files contained content related to startups, marking a departure from the group’s previous focus on defense and educational institutions. The hackers leverage personal information about startup founders to create credible fake documents, increasing the likelihood of successful infiltration.

Technical Execution of the Attack

According to Acronis researchers, the attack begins with emails containing ISO files, which are disguised as Excel spreadsheets. When opened, these files execute a series of hidden commands that install Crimson RAT on the victim’s computer. This malware allows the attackers to monitor and control infected systems, steal files, and record audio without detection.

The malware is delivered through a file named MeetBisht.iso, containing a shortcut file that appears to be an Excel document. However, it also includes a script that silently installs the RAT while displaying a decoy document to the victim. This process effectively bypasses security measures by using PowerShell commands to eliminate warning alerts.

Advanced Evasion Tactics

The Crimson RAT employs advanced evasion techniques to avoid detection. It artificially inflates its size with junk data, complicating signature-based detection. The actual malicious code is much smaller, and the malware uses randomized function names to hinder analysis. The RAT communicates with command-and-control servers via custom TCP protocols on non-standard ports, further obscuring its activities.

To mitigate these threats, organizations are advised to implement robust email filtering to block suspicious attachments, conduct regular security training for employees, and deploy endpoint detection solutions to identify unusual activities. Monitoring network traffic for connections to non-standard ports can also help detect and neutralize such threats.

Staying informed through updated threat intelligence feeds can enhance protection against known attack vectors used by Transparent Tribe. As the threat landscape evolves, proactive measures are crucial to safeguarding India’s tech startups from these sophisticated cyber threats.

Cyber Security News Tags:APT36, command-and-control servers, Crimson RAT, cyber threat, Cybersecurity, email security, endpoint detection, evasion tactics, hacking group, India technology sector, Indian startups, malware attack, network monitoring, remote access trojan, Transparent Tribe

Post navigation

Previous Post: Cybercriminals Exploit Legitimate Platforms for Ransomware
Next Post: FvncBot Exploits Android Accessibility: A New Threat

Related Posts

10 Best Anti-Phishing Tools in 2025 10 Best Anti-Phishing Tools in 2025 Cyber Security News
Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Cyber Security News
Urgent Alert: Craft CMS Vulnerability Under Attack Urgent Alert: Craft CMS Vulnerability Under Attack Cyber Security News
AI-Powered VoidLink Malware Framework Poses New Cyber Threat AI-Powered VoidLink Malware Framework Poses New Cyber Threat Cyber Security News
Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts Cyber Security News
Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark