APT36 is leveraging AI-assisted coding tools to mass-produce malware implants targeting India.

Polyglot binaries (Nim, Zig, Crystal, Rust) + trusted services like Slack & Google Sheets for C2.

Researchers call it Distributed Denial of Detection.

Source: https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html

Follow us for more threat intelligence updates.

#Infosec #APT36 #ThreatIntel #Malware #CyberSecurity

📢⚠️#Pakistan-linked APT36 is flooding Indian government networks with AI-generated “#Vibeware”, disposable malware built with AI. The campaign abuses trusted platforms like Google Sheets, Slack, and Discord for C&C

Read: https://hackread.com/pakistan-apt36-indian-govt-networks-ai-vibeware/

#CyberSecurity #APT36 #TransparentTribe #Malware #AI #CyberAttack

Pakistan-Linked APT36 Floods Indian Govt Networks With AI-Made ‘Vibeware’

Bitdefender research reveals Pakistani group APT36 is using AI-generated vibeware and trusted cloud services like Google Sheets to target Indian officials.

Hackread - Cybersecurity News, Data Breaches, AI and More
APT36 : Multi-Stage LNK Malware Campaign Targeting Indian Government Entities
#APT36
https://www.cyfirma.com/research/apt36-multi-stage-lnk-malware-campaign-targeting-indian-government-entities/
APT36 : Multi-Stage LNK Malware Campaign Targeting Indian Government Entities - CYFIRMA

EXECUTIVE SUMMARY CYFIRMA has identified a targeted malware campaign attributed to APT36 (Transparent Tribe), a Pakistan aligned threat actor actively...

CYFIRMA

Assisi [ca. 1920]
1 print (poster) : lithograph, color ; 98 x 67 cm. | Poster showing Assisi and the countryside as if from a window in a tower.

#Assisi #Italy #Umbria #Italian #ASSISI #APT36 #Umbrian #travelposters #lithographs #italian #assisi(italy) #color #photopgraphy #LibraryOfCongress

https://www.loc.gov/pictures/item/2004675365/

🛡️ APT36 DeskRAT Malware Campaign Against Indian Government
Pakistan-linked APT36 is targeting Indian government systems via Golang-based DeskRAT malware, delivered through spear-phishing emails and malicious ZIP/Desktop attachments. Linux BOSS and Windows systems are compromised, enabling remote access and exfiltration.
💬 How should public sector entities defend against state-sponsored malware campaigns? Share your insights below.

Follow TechNadu for verified cybersecurity news and threat intelligence updates.

#CyberSecurity #APT36 #DeskRAT #Malware #StateSponsoredAttack #InfoSec #ThreatIntel #India #TechNadu #GolangMalware

📢 TransparentTribe (APT36) déploie un nouveau RAT Golang DeskRAT ciblant BOSS Linux via fichiers .desktop piégés
📝 Selon SEKOIA (blog.sekoia.io), TransparentTribe (APT36), un ac...
📖 cyberveille : https://cyberveille.ch/posts/2025-10-23-transparenttribe-apt36-deploie-un-nouveau-rat-golang-deskrat-ciblant-boss-linux-via-fichiers-desktop-pieges/
🌐 source : https://blog.sekoia.io/transparenttribe-targets-indian-military-organisations-with-deskrat/
#APT36 #BOSS_Linux #Cyberveille
TransparentTribe (APT36) déploie un nouveau RAT Golang DeskRAT ciblant BOSS Linux via fichiers .desktop piégés

Selon SEKOIA (blog.sekoia.io), TransparentTribe (APT36), un acteur lié au Pakistan, a fait évoluer sa campagne d’espionnage ciblant des organismes gouvernementaux et de défense indiens en introduisant DeskRAT, un nouveau RAT Linux en Golang livré via des fichiers .desktop malveillants et opéré via une infrastructure C2 WebSocket. 🎯 Ciblage et leurres Campagne d’espionnage visant des entités gouvernementales et de défense indiennes, avec des leurres exploitant les tensions régionales au Ladakh. Passage d’un hébergement sur Google Drive à des serveurs de staging dédiés pour la distribution des charges. 🛠️ Chaîne d’infection et livraison

CyberVeille

Discover how #TransparentTribe (#APT36) uses a disguised DESKTOP dropper to deploy #DeskRAT, a Golang RAT, on BOSS Linux endpoints in India.

Our Sekoia #TDR report breaks down the full infection chain and stealthy WebSocket C2 communications .

Read more 👉 https://blog.sekoia.io/transparenttribe-targets-indian-military-organisations-with-deskrat/

📢 StealthServer : un backdoor Go multiplateforme attribué à APT36 cible Windows et Linux
📝 Selon un billet de blog technique de XLab de QiAnXin (référence fournie), des chercheurs ont identifié StealthServer, un backdoor sophistiqué ciblant à la f...
📖 cyberveille : https://cyberveille.ch/posts/2025-10-16-stealthserver-un-backdoor-go-multiplateforme-attribue-a-apt36-cible-windows-et-linux/
🌐 source : https://blog.xlab.qianxin.com/apt-stealthserver-en/
#APT36 #IOC #Cyberveille
StealthServer : un backdoor Go multiplateforme attribué à APT36 cible Windows et Linux

Selon un billet de blog technique de XLab de QiAnXin (référence fournie), des chercheurs ont identifié StealthServer, un backdoor sophistiqué ciblant à la fois Windows et Linux, attribué au groupe APT36. La distribution repose sur de l’ingénierie sociale avec des leurres à thématique politique et militaire, livrant des charges utiles déguisées en documents PDF. Le malware offre des capacités d’exfiltration de fichiers et d’exécution de commandes à distance, tout en recourant à des techniques anti-analyse étendues, notamment l’injection de code inutile et l’obfuscation du trafic. Plusieurs variantes indiquent un développement actif, avec une transition des communications de TCP vers WebSocket.

CyberVeille
📢 APT36 cible l’Inde : phishing via fichiers .desktop sur Linux pour déployer MeshAgent
📝 Selon Nextron Systems, une campagne sophistiquée attribuée à APT36, rappelant les tactiques d’Operation Sindoor, vise des organisa...
📖 cyberveille : https://cyberveille.ch/posts/2025-08-31-apt36-cible-linde-phishing-via-fichiers-desktop-sur-linux-pour-deployer-meshagent/
🌐 source : https://www.nextron-systems.com/2025/08/29/sindoor-dropper-new-phishing-campaign/
#APT36 #IOC #Cyberveille

In the lead-up to #APNIC60, where Chief Technical Officer Leslie Daigle will give a keynote address, we’re publishing a series of articles that address regionally meaningful threats beyond the well-documented Chinese-origin attacks. Each case offers a different lens on the threat landscape—ranging from geopolitical motivations to financial disruption and targeted espionage. Our goal is to provide context, elevate regional perspectives, and set the stage for deeper discussion during the keynote.

This is the first in that series, covering #APT36, a believed Pakistani state-aligned group that systematically exploits Internet service provider networks to launch cyber operations against Indian targets.

Between April and August 2025, AIDE captured 116,374 incidents on Indian sensors across 75 Autonomous System Numbers (ASNs) based in Pakistan.

The findings show how APT36 abused ISP infrastructure, deployed multi-architecture malware, and exploited routing security gaps at scale.

Read all about what we found, and stay tuned for the next installment.

https://globalcyberalliance.org/aide-data-apt36/

#threatintelligence #threatintel #cybersecurity #AIDE #research #malware #routingsecurity

AIDE Data on APT36: Regional Infrastructure Risks and Security Gaps - GCA | Global Cyber Alliance | Working to Eradicate Cyber Risk

Exploring APT36 (Transparent Tribe), a believed Pakistani state-aligned group launching cyber operations against Indian targets.

GCA | Global Cyber Alliance | Working to Eradicate Cyber Risk