Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’

Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’

Posted on October 21, 2025October 21, 2025 By CWS

A classy phishing marketing campaign orchestrated by Pakistan-linked risk actors has been found concentrating on Indian authorities entities by impersonating the Nationwide Informatics Centre’s e mail companies.

The operation, attributed to APT36, often known as TransparentTribe, leverages social engineering ways to compromise delicate authorities infrastructure by misleading e mail communications designed to seem as reliable NIC eEmail Companies correspondence.

The marketing campaign employs fastidiously crafted phishing lures that mimic official authorities communication channels, exploiting the belief related to NIC’s established e mail infrastructure.

By masquerading as genuine authorities correspondence, the risk actors purpose to trick officers into divulging credentials or downloading malicious payloads.

This concentrating on technique demonstrates the group’s deep understanding of Indian authorities communication protocols and their continued give attention to intelligence gathering operations towards Indian administrative and protection sectors.

Cyber Crew analysts recognized the malicious infrastructure supporting this marketing campaign, uncovering a community of fraudulent domains and command-and-control servers designed to facilitate credential harvesting and knowledge exfiltration.

The operation represents a continuation of APT36’s long-standing espionage actions towards Indian authorities targets, reflecting the group’s persistent curiosity in compromising delicate governmental communications.

Infrastructure and Technical Indicators

The assault infrastructure reveals a multi-layered command-and-control framework centered across the fraudulent area accounts.mgovcloud[.]in.departmentofdefence[.]reside, which intently mimics reliable authorities cloud companies.

The first malicious area departmentofdefence[.]reside serves as the muse for the phishing operation, whereas IP tackle 81.180.93[.]5 operates as a stealth server with C2 performance accessible on port 8080.

Further infrastructure consists of IP 45.141.59[.]168, offering redundancy and resilience to the adversary’s command-and-control community.

This subtle setup allows the risk actors to take care of persistent entry whereas evading detection by a distributed infrastructure that complicates attribution and takedown efforts.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, eEmail, Email, Govt, Indian, Mimic, NIC, Pakistani, Services, Targeting, Threat

Post navigation

Previous Post: How Threat Intelligence Can Save Money and Resources for Businesses
Next Post: Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework

Related Posts

ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data Cyber Security News
Linux 6.17 Released With Fix for use-after-free Vulnerabilities Linux 6.17 Released With Fix for use-after-free Vulnerabilities Cyber Security News
Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses Cyber Security News
Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Cyber Security News
AI-Powered FunkLocker Ransomware Leverages Windows utilities to Disable Defenses AI-Powered FunkLocker Ransomware Leverages Windows utilities to Disable Defenses Cyber Security News
COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark