Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware

APT Hackers Attacking Indian Government Using GOGITTER tool and GITSHELLPAD Malware

Posted on January 27, 2026January 27, 2026 By CWS

Superior persistent menace actors working from Pakistan have launched coordinated assaults towards Indian authorities organizations utilizing newly found instruments and malware designed to bypass safety defenses.

The marketing campaign, recognized as Gopher Strike, emerged in September 2025 and represents a major escalation in focused cyber operations towards delicate authorities infrastructure.

This coordinated assault demonstrates the rising sophistication of state-sponsored menace actors who proceed refining their technical capabilities and operational procedures.

The assault chain begins with fastidiously crafted phishing emails containing misleading PDF paperwork that impersonate reliable authorities communications.

These PDFs show blurred photos of official paperwork and use social engineering techniques to trick recipients into downloading an ISO file by clicking a button labeled “Obtain and Set up,” which seems to request a faux Adobe Acrobat replace.

Instance of a PDF file used within the Gopher Strike marketing campaign (Supply – Zscaler)

The malicious ISO file stays dormant till activated, containing hidden malware designed to ascertain persistent entry to compromised techniques.

The an infection mechanism depends on three custom-built instruments written in Golang that work in live performance to ascertain management over focused machines.

Zscaler analysts and researchers recognized GOGITTER because the preliminary downloader element that fetches further payloads from menace actor-controlled GitHub repositories utilizing embedded authentication tokens.

As soon as deployed, GOGITTER creates a VBScript file referred to as windows_api.vbs that constantly polls command-and-control servers each 30 seconds, checking for brand spanking new directions to execute on the contaminated machine.

GITSHELLPAD’s Revolutionary GitHub-Based mostly Persistence Mechanism

GITSHELLPAD represents the marketing campaign’s most distinctive aspect, functioning as a light-weight backdoor that leverages non-public GitHub repositories for all command-and-control communication.

This method permits the menace actor to cover malicious visitors inside legitimate-looking GitHub exercise, making detection considerably harder for safety monitoring instruments.

Upon an infection, GITSHELLPAD registers the sufferer by creating a brand new listing within the menace actor’s non-public repository utilizing the format SYSTEM-[hostname], then provides an information.txt file containing Base64-encoded system details about the compromised machine.

The backdoor polls GitHub’s API each 15 seconds for brand spanking new directions saved in a command.txt file, permitting operators to remotely execute reconnaissance instructions, obtain further instruments, or stage additional malware deployments.

This design proves significantly efficient as a result of it avoids conventional community indicators whereas sustaining dependable two-way communication by a service tens of millions of organizations already belief and whitelist for reliable improvement functions.

Gopher Strike marketing campaign results in the deployment of Cobalt Strike (Supply – Zscaler)

The ultimate stage includes deploying Cobalt Strike Beacon by GOSHELL, a {custom} shellcode loader that executes solely on machines with particular hardcoded hostnames, additional proscribing the payload to supposed targets.

Safety researchers proceed monitoring this evolving menace to guard authorities networks towards future assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:APT, Attacking, GITSHELLPAD, GOGITTER, Government, Hackers, Indian, Malware, Tool

Post navigation

Previous Post: Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks
Next Post: Critical Vulnerability in Python PLY Library Enables Remote Code Execution

Related Posts

India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones Cyber Security News
Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Cyber Security News
Linux Malware Authors Attacking Cloud Environments Using ELF Binaries Linux Malware Authors Attacking Cloud Environments Using ELF Binaries Cyber Security News
Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations Cyber Security News
Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges Cyber Security News
ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News