Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities

Posted on December 1, 2025December 1, 2025 By CWS

Pakistan-based menace actor APT36, also called Clear Tribe, has launched a complicated cyber-espionage marketing campaign in opposition to Indian authorities establishments utilizing a newly developed Python-based ELF malware.

The assault marks a big escalation within the group’s capabilities, demonstrating their rising technical maturity and adaptableness to Linux-based working techniques.

The marketing campaign facilities on spear-phishing emails containing weaponized Linux shortcut recordsdata designed to deceive authorities staff.

When recipients extract and open these recordsdata, the malware silently downloads and executes malicious parts within the background whereas displaying seemingly innocent content material to the consumer.

This dual-layer method permits the attackers to take care of stealth whereas establishing persistent entry to crucial infrastructure. APT36’s shift towards Linux focusing on represents a strategic evolution of their operational doctrine.

The group has traditionally centered on Home windows-based assaults, however this new marketing campaign reveals their dedication to focusing on the BOSS working system, which is extensively deployed throughout Indian authorities companies.

By adapting their instruments to take advantage of a number of platforms, the menace actors considerably develop their assault floor and operational effectiveness.

Cyfirma safety analysts recognized the malware after discovering the weaponized .desktop recordsdata being distributed by way of focused phishing campaigns.

Analysis_Proc_Report_Gem.desktop (Supply – Cyfirma)

The researchers famous that the an infection chain begins with a misleading archive file containing the malicious shortcut, which triggers a multi-stage payload supply course of.

As soon as executed, the shortcut downloads a decoy PDF doc to distract the consumer whereas concurrently fetching and putting in the precise ELF malware payload from attacker-controlled servers.

Malware’s an infection mechanism

The malware’s an infection mechanism depends on .desktop recordsdata as middleman supply vectors, permitting the menace actors to hide their malicious intent whereas sustaining flexibility in payload deployment.

Not like instantly transmitting ELF binaries, which safety techniques can extra simply detect, .desktop recordsdata seem reliable to Linux customers whereas working embedded instructions.

Supply code of the bash file (Supply – Cyfirma)

This method permits dynamic payload retrieval and considerably reduces forensic proof.

Malicious 64-bit ELF (Supply – Cyfirma)

Evaluation of the extracted malware reveals a feature-rich distant entry instrument able to executing arbitrary shell instructions, establishing command-and-control communication, capturing screenshots, and exfiltrating information.

Shell Instructions (Supply – Cyfirma)

The malware makes use of systemd user-level providers to determine persistence, guaranteeing it continues working throughout system reboots and consumer periods.

Researchers found that the menace actor strategically makes use of the .desktop file format mixed with shell script execution to bypass conventional safety controls and preserve undetected presence.

The marketing campaign infrastructure makes use of just lately registered domains and compromised servers situated in a number of nations.

The malicious area lionsdenim[.]xyz, registered simply 22 days prior, mixed with IP tackle 185.235.137.90 in Frankfurt, facilitates payload supply.

Indian authorities companies ought to implement rapid mitigation measures, together with enhanced e-mail safety, endpoint detection and response options, and strict utility authorization insurance policies to counter this persistent menace.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT36, ELF, Entities, Government, Hackers, Indian, Malware, PythonBased, Target

Post navigation

Previous Post: CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack
Next Post: Why the New AI Browsers War is a Nightmare for Security Teams

Related Posts

Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network Cyber Security News
CISA Warns of Android 0-Day Vulnerability Exploited in Attacks Cyber Security News
Authorities Arrested Admins Of “LockerGoga,” “MegaCortex,” And “Nefilim” Ransomware Gands Cyber Security News
Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models Cyber Security News
New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer Cyber Security News
Bob Flores, Former CTO of the CIA, Joins Brinker Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark