Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities

Posted on December 1, 2025December 1, 2025 By CWS

Pakistan-based menace actor APT36, also called Clear Tribe, has launched a complicated cyber-espionage marketing campaign in opposition to Indian authorities establishments utilizing a newly developed Python-based ELF malware.

The assault marks a big escalation within the group’s capabilities, demonstrating their rising technical maturity and adaptableness to Linux-based working techniques.

The marketing campaign facilities on spear-phishing emails containing weaponized Linux shortcut recordsdata designed to deceive authorities staff.

When recipients extract and open these recordsdata, the malware silently downloads and executes malicious parts within the background whereas displaying seemingly innocent content material to the consumer.

This dual-layer method permits the attackers to take care of stealth whereas establishing persistent entry to crucial infrastructure. APT36’s shift towards Linux focusing on represents a strategic evolution of their operational doctrine.

The group has traditionally centered on Home windows-based assaults, however this new marketing campaign reveals their dedication to focusing on the BOSS working system, which is extensively deployed throughout Indian authorities companies.

By adapting their instruments to take advantage of a number of platforms, the menace actors considerably develop their assault floor and operational effectiveness.

Cyfirma safety analysts recognized the malware after discovering the weaponized .desktop recordsdata being distributed by way of focused phishing campaigns.

Analysis_Proc_Report_Gem.desktop (Supply – Cyfirma)

The researchers famous that the an infection chain begins with a misleading archive file containing the malicious shortcut, which triggers a multi-stage payload supply course of.

As soon as executed, the shortcut downloads a decoy PDF doc to distract the consumer whereas concurrently fetching and putting in the precise ELF malware payload from attacker-controlled servers.

Malware’s an infection mechanism

The malware’s an infection mechanism depends on .desktop recordsdata as middleman supply vectors, permitting the menace actors to hide their malicious intent whereas sustaining flexibility in payload deployment.

Not like instantly transmitting ELF binaries, which safety techniques can extra simply detect, .desktop recordsdata seem reliable to Linux customers whereas working embedded instructions.

Supply code of the bash file (Supply – Cyfirma)

This method permits dynamic payload retrieval and considerably reduces forensic proof.

Malicious 64-bit ELF (Supply – Cyfirma)

Evaluation of the extracted malware reveals a feature-rich distant entry instrument able to executing arbitrary shell instructions, establishing command-and-control communication, capturing screenshots, and exfiltrating information.

Shell Instructions (Supply – Cyfirma)

The malware makes use of systemd user-level providers to determine persistence, guaranteeing it continues working throughout system reboots and consumer periods.

Researchers found that the menace actor strategically makes use of the .desktop file format mixed with shell script execution to bypass conventional safety controls and preserve undetected presence.

The marketing campaign infrastructure makes use of just lately registered domains and compromised servers situated in a number of nations.

The malicious area lionsdenim[.]xyz, registered simply 22 days prior, mixed with IP tackle 185.235.137.90 in Frankfurt, facilitates payload supply.

Indian authorities companies ought to implement rapid mitigation measures, together with enhanced e-mail safety, endpoint detection and response options, and strict utility authorization insurance policies to counter this persistent menace.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT36, ELF, Entities, Government, Hackers, Indian, Malware, PythonBased, Target

Post navigation

Previous Post: CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack
Next Post: Why the New AI Browsers War is a Nightmare for Security Teams

Related Posts

Citrix Netscaler 0-day RCE Vulnerability Patched Cyber Security News
How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  Cyber Security News
SonicOS SSLVPN Vulnerability Let Attackers Crash the Firewall Remotely Cyber Security News
New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors Cyber Security News
Cloudflare API Outage Linked to React useEffect Bug Causes Service Overload and Recovery Failure Cyber Security News
Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark