Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Pakistan-Linked Cyber Espionage Targets India’s Defense

Pakistan-Linked Cyber Espionage Targets India’s Defense

Posted on February 10, 2026 By CWS

Recent reports have unveiled a complex series of cyber espionage campaigns targeting India’s government and defense sectors. These attacks are attributed to the Pakistan-based group known as Transparent Tribe, also referred to as APT36. The campaigns leverage sophisticated malware tools to compromise systems, including both Windows and Linux environments, highlighting the persistent threat posed by state-sponsored cyber activities.

Malware Targeting Windows and Linux

The ongoing cyber campaigns utilize various Remote Access Trojans (RATs) to achieve their objectives. One such tool, GETA RAT, is a .NET-based malware favored by the SideCopy subgroup of Transparent Tribe. This malware cleverly exploits legitimate Windows processes to evade detection, ensuring a resilient foothold for intelligence gathering endeavors.

In parallel, another campaign focuses on Linux systems using ARES RAT, a Python-based malware. ARES RAT employs a Go-based downloader for deployment, which conducts extensive system profiling and data exfiltration, maintaining persistence through systemd user services, allowing it to remain unnoticed during typical operations.

Emerging Threats and Techniques

Alongside these established tools, a new threat has emerged in the form of Desk RAT. Distributed via malicious PowerPoint add-ins, Desk RAT leverages Go-based technology to conduct detailed system diagnostics. Communication with its operators is facilitated through WebSocket-based command-and-control channels, which enables continuous monitoring of compromised systems.

The deployment of these tools is primarily achieved through phishing tactics, involving weaponized attachments and links leading to malicious files and scripts. This method of initial access is a testament to the sophisticated nature of the attacks, which also utilize living-off-the-land techniques to execute payloads stealthily.

Implications of State-Sponsored Cyber Attacks

Aditya Sood, VP of Security Engineering and AI Strategy at Aryaka, emphasizes that these attacks reflect a broader trend of increasing state-sponsored cyber espionage. These actions are not limited to adversarial nations but often involve economic intelligence gathering amid global trade tensions. With India increasing its defense budget, such intelligence is invaluable to competing nations seeking economic leverage.

Aryaka’s in-depth analysis of these campaigns not only sheds light on the tools and tactics employed but also underscores the shifting landscape of cyber threats. As geo-political tensions and economic rivalries continue to grow, the frequency and sophistication of state-sponsored attacks are expected to rise, presenting significant challenges for cybersecurity professionals worldwide.

The persistence and stealth of the GETA, ARES, and Desk RATs highlight the ongoing evolution of cyber threats, necessitating continuous vigilance and adaptation by those tasked with defending against these incursions.

Security Week News Tags:APT36, ARES RAT, cyber attacks, cyber espionage, Cybersecurity, defense sector, Desk RAT, GETA RAT, India, Pakistan

Post navigation

Previous Post: Reynolds Ransomware Uses Vulnerable Driver to Bypass Security
Next Post: Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities

Related Posts

DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total  DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total  Security Week News
Chinese Hackers Exploiting React2Shell Vulnerability Chinese Hackers Exploiting React2Shell Vulnerability Security Week News
Exploitation of React2Shell Surges – SecurityWeek Exploitation of React2Shell Surges – SecurityWeek Security Week News
Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications Security Week News
Recent SAP S/4HANA Vulnerability Exploited in Attacks Recent SAP S/4HANA Vulnerability Exploited in Attacks Security Week News
New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs  New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Six New Microsoft Vulnerabilities Added to CISA’s KEV List
  • Fortinet Addresses Critical Security Flaws in Latest Update
  • Critical Windows Shell Vulnerability Threatens User Security
  • Critical Vulnerabilities Found in Intel’s TDX by Google
  • Socelars Malware Targets Windows for Data Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Six New Microsoft Vulnerabilities Added to CISA’s KEV List
  • Fortinet Addresses Critical Security Flaws in Latest Update
  • Critical Windows Shell Vulnerability Threatens User Security
  • Critical Vulnerabilities Found in Intel’s TDX by Google
  • Socelars Malware Targets Windows for Data Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark