Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware

Posted on January 27, 2026January 27, 2026 By CWS

Superior persistent menace actors working from Pakistan have launched coordinated assaults towards Indian authorities organizations utilizing newly found instruments and malware designed to bypass safety defenses.

The marketing campaign, recognized as Gopher Strike, emerged in September 2025 and represents a major escalation in focused cyber operations towards delicate authorities infrastructure.

This coordinated assault demonstrates the rising sophistication of state-sponsored menace actors who proceed refining their technical capabilities and operational procedures.

The assault chain begins with fastidiously crafted phishing emails containing misleading PDF paperwork that impersonate reliable authorities communications.

These PDFs show blurred photos of official paperwork and use social engineering techniques to trick recipients into downloading an ISO file by clicking a button labeled “Obtain and Set up,” which seems to request a faux Adobe Acrobat replace.

Instance of a PDF file used within the Gopher Strike marketing campaign (Supply – Zscaler)

The malicious ISO file stays dormant till activated, containing hidden malware designed to ascertain persistent entry to compromised techniques.

The an infection mechanism depends on three custom-built instruments written in Golang that work in live performance to ascertain management over focused machines.

Zscaler analysts and researchers recognized GOGITTER because the preliminary downloader element that fetches further payloads from menace actor-controlled GitHub repositories utilizing embedded authentication tokens.

As soon as deployed, GOGITTER creates a VBScript file referred to as windows_api.vbs that constantly polls command-and-control servers each 30 seconds, checking for brand spanking new directions to execute on the contaminated machine.

GITSHELLPAD’s Revolutionary GitHub-Based mostly Persistence Mechanism

GITSHELLPAD represents the marketing campaign’s most distinctive aspect, functioning as a light-weight backdoor that leverages non-public GitHub repositories for all command-and-control communication.

This method permits the menace actor to cover malicious visitors inside legitimate-looking GitHub exercise, making detection considerably harder for safety monitoring instruments.

Upon an infection, GITSHELLPAD registers the sufferer by creating a brand new listing within the menace actor’s non-public repository utilizing the format SYSTEM-[hostname], then provides an information.txt file containing Base64-encoded system details about the compromised machine.

The backdoor polls GitHub’s API each 15 seconds for brand spanking new directions saved in a command.txt file, permitting operators to remotely execute reconnaissance instructions, obtain further instruments, or stage additional malware deployments.

This design proves significantly efficient as a result of it avoids conventional community indicators whereas sustaining dependable two-way communication by a service tens of millions of organizations already belief and whitelist for reliable improvement functions.

Gopher Strike marketing campaign results in the deployment of Cobalt Strike (Supply – Zscaler)

The ultimate stage includes deploying Cobalt Strike Beacon by GOSHELL, a {custom} shellcode loader that executes solely on machines with particular hardcoded hostnames, additional proscribing the payload to supposed targets.

Safety researchers proceed monitoring this evolving menace to guard authorities networks towards future assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:APT, Attacking, GITSHELLPAD, GOGITTER, Government, Hackers, Indian, Malware, Tool

Post navigation

Previous Post: Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks
Next Post: Critical Vulnerability in Python PLY Library Enables Remote Code Execution

Related Posts

A Free Zero Trust Web Application Firewall for 2026 Cyber Security News
Canva Down – Suffers Global Outage, Leaving Millions of Users Inaccessible Cyber Security News
PDFSIDER Malware Actively Used by Threat Actors to Bypass Antivirus and EDR Systems Cyber Security News
Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware Cyber Security News
GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise Cyber Security News
NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Notepad++ Supply Chain Hack Conducted by China via Hosting Provider
  • Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users
  • Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics
  • 1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks
  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Notepad++ Supply Chain Hack Conducted by China via Hosting Provider
  • Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users
  • Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics
  • 1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks
  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark