Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware

Posted on January 27, 2026January 27, 2026 By CWS

Superior persistent menace actors working from Pakistan have launched coordinated assaults towards Indian authorities organizations utilizing newly found instruments and malware designed to bypass safety defenses.

The marketing campaign, recognized as Gopher Strike, emerged in September 2025 and represents a major escalation in focused cyber operations towards delicate authorities infrastructure.

This coordinated assault demonstrates the rising sophistication of state-sponsored menace actors who proceed refining their technical capabilities and operational procedures.

The assault chain begins with fastidiously crafted phishing emails containing misleading PDF paperwork that impersonate reliable authorities communications.

These PDFs show blurred photos of official paperwork and use social engineering techniques to trick recipients into downloading an ISO file by clicking a button labeled “Obtain and Set up,” which seems to request a faux Adobe Acrobat replace.

Instance of a PDF file used within the Gopher Strike marketing campaign (Supply – Zscaler)

The malicious ISO file stays dormant till activated, containing hidden malware designed to ascertain persistent entry to compromised techniques.

The an infection mechanism depends on three custom-built instruments written in Golang that work in live performance to ascertain management over focused machines.

Zscaler analysts and researchers recognized GOGITTER because the preliminary downloader element that fetches further payloads from menace actor-controlled GitHub repositories utilizing embedded authentication tokens.

As soon as deployed, GOGITTER creates a VBScript file referred to as windows_api.vbs that constantly polls command-and-control servers each 30 seconds, checking for brand spanking new directions to execute on the contaminated machine.

GITSHELLPAD’s Revolutionary GitHub-Based mostly Persistence Mechanism

GITSHELLPAD represents the marketing campaign’s most distinctive aspect, functioning as a light-weight backdoor that leverages non-public GitHub repositories for all command-and-control communication.

This method permits the menace actor to cover malicious visitors inside legitimate-looking GitHub exercise, making detection considerably harder for safety monitoring instruments.

Upon an infection, GITSHELLPAD registers the sufferer by creating a brand new listing within the menace actor’s non-public repository utilizing the format SYSTEM-[hostname], then provides an information.txt file containing Base64-encoded system details about the compromised machine.

The backdoor polls GitHub’s API each 15 seconds for brand spanking new directions saved in a command.txt file, permitting operators to remotely execute reconnaissance instructions, obtain further instruments, or stage additional malware deployments.

This design proves significantly efficient as a result of it avoids conventional community indicators whereas sustaining dependable two-way communication by a service tens of millions of organizations already belief and whitelist for reliable improvement functions.

Gopher Strike marketing campaign results in the deployment of Cobalt Strike (Supply – Zscaler)

The ultimate stage includes deploying Cobalt Strike Beacon by GOSHELL, a {custom} shellcode loader that executes solely on machines with particular hardcoded hostnames, additional proscribing the payload to supposed targets.

Safety researchers proceed monitoring this evolving menace to guard authorities networks towards future assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:APT, Attacking, GITSHELLPAD, GOGITTER, Government, Hackers, Indian, Malware, Tool

Post navigation

Previous Post: Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks
Next Post: Critical Vulnerability in Python PLY Library Enables Remote Code Execution

Related Posts

New Phishing Attack Impersonates as DWP Attacking Users to Steal Credit Card Data Cyber Security News
Microsoft to Add Brand Impersonation Protection Warning to Teams Calls Cyber Security News
DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots Cyber Security News
Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years Cyber Security News
Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content Cyber Security News
Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyber Insights 2026: Malware and Cyberattacks in the Age of AI
  • Japan, Britain to Boost Cybersecurity and Critical Minerals Cooperation as China’s Influence Grows
  • Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note
  • Notepad++ Supply Chain Hack Conducted by China via Hosting Provider
  • Arsink Rat Attacking Android Devices to Exfiltrate Sensitive Data and Enable Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyber Insights 2026: Malware and Cyberattacks in the Age of AI
  • Japan, Britain to Boost Cybersecurity and Critical Minerals Cooperation as China’s Influence Grows
  • Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note
  • Notepad++ Supply Chain Hack Conducted by China via Hosting Provider
  • Arsink Rat Attacking Android Devices to Exfiltrate Sensitive Data and Enable Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark