Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Transparent Tribe Targets India’s Tech Startups

Transparent Tribe Targets India’s Tech Startups

Posted on February 6, 2026 By CWS

India’s technology sector is facing a new cyber threat as the hacking group known as Transparent Tribe turns its attention towards the country’s burgeoning startup ecosystem. Previously focused on government entities, the Pakistan-based group is now targeting firms in cybersecurity and intelligence, using sophisticated tactics to breach defenses.

Shift in Target: From Government to Startups

Known in the cybersecurity community as APT36, Transparent Tribe has been active since 2013. Their latest strategy involves deploying the Crimson RAT malware to infiltrate Indian startups. The group carefully crafts fake emails with malicious attachments, masquerading as legitimate documents, to deceive unsuspecting victims.

This shift was detected when researchers came across suspicious files uploaded from India. These files contained content related to startups, marking a departure from the group’s previous focus on defense and educational institutions. The hackers leverage personal information about startup founders to create credible fake documents, increasing the likelihood of successful infiltration.

Technical Execution of the Attack

According to Acronis researchers, the attack begins with emails containing ISO files, which are disguised as Excel spreadsheets. When opened, these files execute a series of hidden commands that install Crimson RAT on the victim’s computer. This malware allows the attackers to monitor and control infected systems, steal files, and record audio without detection.

The malware is delivered through a file named MeetBisht.iso, containing a shortcut file that appears to be an Excel document. However, it also includes a script that silently installs the RAT while displaying a decoy document to the victim. This process effectively bypasses security measures by using PowerShell commands to eliminate warning alerts.

Advanced Evasion Tactics

The Crimson RAT employs advanced evasion techniques to avoid detection. It artificially inflates its size with junk data, complicating signature-based detection. The actual malicious code is much smaller, and the malware uses randomized function names to hinder analysis. The RAT communicates with command-and-control servers via custom TCP protocols on non-standard ports, further obscuring its activities.

To mitigate these threats, organizations are advised to implement robust email filtering to block suspicious attachments, conduct regular security training for employees, and deploy endpoint detection solutions to identify unusual activities. Monitoring network traffic for connections to non-standard ports can also help detect and neutralize such threats.

Staying informed through updated threat intelligence feeds can enhance protection against known attack vectors used by Transparent Tribe. As the threat landscape evolves, proactive measures are crucial to safeguarding India’s tech startups from these sophisticated cyber threats.

Cyber Security News Tags:APT36, command-and-control servers, Crimson RAT, cyber threat, Cybersecurity, email security, endpoint detection, evasion tactics, hacking group, India technology sector, Indian startups, malware attack, network monitoring, remote access trojan, Transparent Tribe

Post navigation

Previous Post: Cybercriminals Exploit Legitimate Platforms for Ransomware
Next Post: FvncBot Exploits Android Accessibility: A New Threat

Related Posts

WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System Cyber Security News
APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules Cyber Security News
PDFSIDER Malware Actively Used by Threat Actors to Bypass Antivirus and EDR Systems PDFSIDER Malware Actively Used by Threat Actors to Bypass Antivirus and EDR Systems Cyber Security News
Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover Cyber Security News
BlindEagle Hackers Attacking Government Agencies with Powershell Scripts BlindEagle Hackers Attacking Government Agencies with Powershell Scripts Cyber Security News
Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News