Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT36 and SideCopy Target Indian Defense with RATs

APT36 and SideCopy Target Indian Defense with RATs

Posted on February 11, 2026 By CWS

Recent cyber espionage campaigns targeting the Indian defense sector have raised alarms due to their sophisticated use of remote access trojans (RATs). These operations, attributed to threat actors like APT36 and SideCopy, aim to infiltrate both Windows and Linux systems to steal sensitive information and maintain prolonged access to compromised devices.

Key Players and Malware Used

The campaigns are primarily associated with malware families such as Geta RAT, Ares RAT, and DeskRAT. These tools are linked to SideCopy and APT36, with the latter also known as Transparent Tribe. Active since 2019, SideCopy is considered an offshoot of Transparent Tribe, indicating a well-coordinated strategy behind these operations.

Aditya K. Sood, Aryaka’s vice president of Security Engineering and AI Strategy, highlights that these campaigns refine rather than reinvent traditional espionage techniques. By expanding their reach across platforms and exploring new delivery methods, these threat actors continue to operate below the radar while maintaining their strategic focus.

Infiltration Techniques

The attack strategies often begin with phishing emails that contain malicious attachments or download links, leading victims to attacker-controlled servers. These initial vectors use Windows shortcuts, ELF binaries, and PowerPoint Add-Ins to initiate a multi-stage process to deploy RATs.

Once deployed, these RATs provide persistent access, allowing attackers to conduct system reconnaissance, execute commands, and facilitate long-term operations on both Windows and Linux platforms. One particular attack chain involves a malicious LNK file that executes an HTML Application, eventually leading to the installation of Geta RAT after bypassing security checks.

Ongoing Threats and Response

Parallel to the Windows attacks, a Linux variant employs a Go binary to install a Python-based Ares RAT via a shell script. Similar to Geta RAT, Ares RAT enables a wide array of commands to exfiltrate data and execute attacker-driven scripts.

In another observed campaign, the Golang malware DeskRAT is distributed through a rogue PowerPoint Add-In. This tactic underscores the evolving arsenal of tools optimized for stealth and persistence. Documented by Sekoia and QiAnXin XLab, APT36’s use of DeskRAT highlights their ongoing efforts to target strategic Indian sectors.

These campaigns demonstrate a deliberate approach by well-resourced threat actors to compromise Indian defense and other critical sectors. By using defense-themed lures and impersonated official documents, they exploit trusted regional infrastructure to expand their reach beyond defense to policy, research, and critical infrastructure organizations.

As these threats evolve, it is crucial for targeted entities to bolster their cybersecurity defenses and remain vigilant against such sophisticated espionage tactics.

The Hacker News Tags:APT36, ARES RAT, cyber espionage, Cybersecurity, DeskRAT, GETA RAT, Indian defense, Linux, remote access trojan, SideCopy, Windows

Post navigation

Previous Post: Prometei Botnet Targets Windows Servers with Advanced Tactics
Next Post: Signs of Concealed Information in Security Management

Related Posts

North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware The Hacker News
Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks The Hacker News
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions The Hacker News
AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar The Hacker News
Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions The Hacker News
Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark