Skip to main content

Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

Medium
Published: Wed Apr 30 2025 (04/30/2025, 21:24:45 UTC)
Source: AlienVault OTX General

Description

A Pakistan-linked APT group, Transparent Tribe (APT36), is targeting Indian Government and Defense personnel using 'Pahalgam Terror Attack' themed documents. The campaign involves credential phishing and deployment of malicious payloads, with fake domains impersonating Jammu & Kashmir Police and Indian Air Force. The phishing PDF documents contain embedded links leading to fake login pages. A PowerPoint add-on file with malicious macros has been identified, which drops the Crimson RAT payload. The campaign exploits sensitive geopolitical issues to maximize impact and extract intelligence. Multiple phishing domains were created shortly after the attack, impersonating various Indian government entities. The potential impact includes disruption of sensitive operations, information manipulation, and data breaches.

AI-Powered Analysis

AILast updated: 07/02/2025, 05:25:58 UTC

Technical Analysis

The threat involves a targeted cyber espionage campaign conducted by the Pakistan-linked Advanced Persistent Threat (APT) group known as Transparent Tribe or APT36. This campaign specifically targets Indian Government and Defense personnel by leveraging geopolitical tensions surrounding the Pahalgam terror attack. The attackers employ social engineering techniques, primarily credential phishing, using decoy documents themed around the Pahalgam attack to lure victims. These documents include phishing PDFs embedding links that redirect to counterfeit login portals impersonating official Indian government entities such as the Jammu & Kashmir Police and the Indian Air Force. Additionally, malicious PowerPoint add-on files containing macros are used to deploy the Crimson Remote Access Trojan (RAT), a sophisticated malware capable of persistent access and data exfiltration. The campaign uses multiple fake domains created shortly after the real-world attack to increase credibility and maximize victim engagement. The attack chain involves several tactics and techniques, including spear-phishing (T1566.001), use of malicious macros (T1204.001), credential harvesting (T1113), reconnaissance (T1083, T1082), and establishing persistence (T1547.001). The Crimson RAT payload allows attackers to manipulate information, disrupt sensitive operations, and exfiltrate confidential data, posing significant risks to national security and intelligence confidentiality. While no known exploits are reported in the wild beyond this campaign, the sophistication and targeted nature of the attack highlight the advanced capabilities of APT36 and their focus on exploiting geopolitical events for intelligence gathering.

Potential Impact

For European organizations, the direct impact of this specific campaign is limited due to its targeting of Indian government and defense personnel and the geopolitical context centered on India-Pakistan relations. However, European entities with diplomatic, defense, or intelligence ties to India or involved in Indo-European collaborations could face indirect risks, such as espionage spillover or secondary targeting by the same APT group. The use of sophisticated phishing and malware techniques demonstrates a capability that could be adapted against European targets in future campaigns. Additionally, European companies providing cybersecurity services, government agencies monitoring global threats, and multinational organizations with Indian operations should be aware of such tactics to anticipate similar threat actor behaviors. The campaign underscores the importance of vigilance against geopolitical-themed social engineering attacks, which can be tailored to exploit regional sensitivities and trust in official government communications.

Mitigation Recommendations

1. Implement advanced email filtering and phishing detection solutions that can identify and quarantine spear-phishing attempts, especially those containing malicious macros or links to fake login pages. 2. Conduct targeted security awareness training for employees, emphasizing the risks of opening unsolicited documents themed around current geopolitical events and the dangers of enabling macros in Office documents. 3. Enforce multi-factor authentication (MFA) on all critical systems and services to reduce the risk of credential compromise leading to unauthorized access. 4. Regularly audit and monitor network traffic for connections to suspicious or newly registered domains, particularly those impersonating government entities. 5. Deploy endpoint detection and response (EDR) tools capable of identifying and blocking Crimson RAT and similar malware behaviors, including persistence mechanisms and unusual process executions. 6. Establish threat intelligence sharing with relevant national and international cybersecurity organizations to stay updated on emerging APT tactics and indicators of compromise (IOCs). 7. Harden PowerPoint and Office macro settings by disabling macros by default and allowing only digitally signed macros from trusted sources. 8. Conduct regular penetration testing and phishing simulations tailored to geopolitical themes to assess organizational resilience and improve detection capabilities.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/advisory-pahalgam-attack-themed-decoys-used-by-apt36-to-target-the-indian-government/"]
Adversary
APT36
Pulse Id
6812951d3a6f003cf010a5aa
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash00cd306f7cdcfe187c561dd42ab40f33
hash026e8e7acb2f2a156f8afff64fd54066
hash2fde001f4c17c8613480091fa48b55a0
hash70b8040730c62e4a52a904251fa74029
hash7b08580a4f6995f645a5bf8addbefa68
hashb03211f6feccd3a62273368b52f6079d
hashc4f591cad9d158e2fbb0ed6425ce3804
hashc4fb60217e3d43eac92074c45228506a
hashd946e3e94fec670f9e47aca186ecaabe
hashf5cd5f616a482645bbf8f4c51ee38958
hash2539e2753579cffc605991614a7ea7fbe7893d6e
hash2b4f38b38771e1ed8cd02a828a6f3ab567a2c913
hash3ba03d625f80fec1b59569bdee8df000904074ac
hash68a848730402c99df2b244e4f421965147b6564e
hash1d56e3fd6e8b45cf01b36cc95e35eb3644018231e528f4ac115c39c7e01e30ba
hash486b535c91e8609867bce918693dd24f0d93437a710281ea65f34a9c088211ef
hash6fcbcdcafc5accf1b2b0453eccd93c203ab1dca9920521b107c9cff8c0236eb2
hashd1a1eaefe6bd2e245bba369e966d7a8eab9ed6ad1fa827321e5889cc8d43f976

Domain

ValueDescriptionCopy
domainkashmirattack.exposed
domainemail.gov.in.briefcases.email
domainemail.gov.in.defenceindia.ltd
domainemail.gov.in.departmentofdefence.de
domainemail.gov.in.departmentofdefenceindia.link
domainemail.gov.in.departmentofspace.info
domainemail.gov.in.drdosurvey.info
domainemail.gov.in.indiadefencedepartment.link
domainemail.gov.in.indiandefence.work
domainemail.gov.in.indiangov.download
domainemail.gov.in.ministryofdefenceindia.org
domainemail.gov.in.modindia.link
domainiaf.nic.in.ministryofdefenceindia.org
domainindianarmy.nic.in.departmentofdefence.de
domainindianarmy.nic.in.ministryofdefenceindia.org
domainjkpolice.gov.in.kashmirattack.exposed
domainjkpolice.gov.in.kashmiraxxack.exposed

Threat ID: 683a1f6a182aa0cae2c19003

Added to database: 5/30/2025, 9:13:14 PM

Last enriched: 7/2/2025, 5:25:58 AM

Last updated: 7/29/2025, 4:11:45 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats