APT Attacks Target Indian Government Using GOGITTER, GITSHELLPAD, and GOSHELL | Part 1
A Pakistan-linked APT group conducted two campaigns targeting Indian government entities. The Gopher Strike campaign used PDFs with malicious links to deliver an ISO file containing GOGITTER, a Golang downloader that fetches payloads from private GitHub repositories. GITSHELLPAD, a Golang backdoor, was used for C2 communication via GitHub. GOSHELL, a Golang shellcode loader, deployed Cobalt Strike Beacon on specific hostnames. The attackers used various techniques including scheduled tasks for persistence, obfuscation, and environmental keying. Post-compromise activities involved system reconnaissance and data exfiltration. The campaign demonstrated sophisticated TTPs and custom-built tools, indicating a potentially new subgroup or parallel Pakistan-linked threat actor.
AI Analysis
Technical Summary
This threat involves a Pakistan-linked advanced persistent threat group, APT36, conducting targeted cyber espionage campaigns against Indian government entities. The attackers use a multi-stage infection chain starting with weaponized PDFs containing malicious links that deliver ISO files. These ISO files deploy GOGITTER, a downloader written in Golang, which retrieves additional payloads from private GitHub repositories, leveraging GitHub as a covert command and control (C2) infrastructure. GITSHELLPAD, another Golang-based backdoor, facilitates C2 communication through GitHub, enabling stealthy command execution and data exfiltration. GOSHELL, a Golang shellcode loader, is used to deploy Cobalt Strike Beacon on specific hostnames, providing the attackers with a powerful post-exploitation framework for lateral movement, persistence, and further reconnaissance. The attackers utilize scheduled tasks for persistence, obfuscation techniques to hinder analysis, and environmental keying to ensure payloads execute only in intended environments, reducing the risk of detection. Post-compromise activities include system reconnaissance (e.g., gathering system information and network details) and data exfiltration, indicating espionage objectives. The use of Golang for malware development enhances cross-platform capabilities and complicates detection due to less common signatures. The campaign's sophistication and custom tooling suggest the emergence of a new subgroup or parallel actor within the Pakistan-linked APT ecosystem. No public exploits are currently known, and the campaign is ongoing as of early 2026.
Potential Impact
For European organizations, the direct impact of this specific campaign is currently limited due to its targeting of Indian government entities. However, the use of GitHub as a C2 channel and Golang-based malware indicates a trend that could be adopted by similar threat actors targeting European governments or critical infrastructure. The techniques employed—such as environmental keying and scheduled task persistence—demonstrate advanced evasion capabilities that could challenge European defenders if adapted against their networks. Additionally, the deployment of Cobalt Strike Beacon, a widely used post-exploitation tool, could facilitate extensive lateral movement and data theft if similar campaigns target European entities. The indirect impact includes the potential for supply chain or third-party compromise via GitHub repositories, which are globally accessible. European organizations should be aware of the evolving TTPs and prepare for possible spillover or targeting of their government or critical sectors. The espionage nature of the campaign highlights risks to confidentiality and integrity of sensitive information.
Mitigation Recommendations
European organizations should implement advanced monitoring of network traffic for unusual GitHub API or repository access patterns, especially from internal systems. Deploy endpoint detection and response (EDR) solutions capable of detecting Golang-based malware and Cobalt Strike Beacon activity, including behavioral indicators such as scheduled task creation and shellcode injection. Enforce strict access controls and multi-factor authentication (MFA) on developer and operational GitHub accounts to prevent abuse of private repositories. Conduct threat hunting exercises focusing on indicators of compromise related to scheduled tasks, environmental keying, and obfuscated binaries. Network segmentation and least privilege principles should be applied to limit lateral movement potential. Regularly audit and monitor ISO and PDF file handling policies to reduce the risk of initial infection vectors. Employ threat intelligence sharing with national CERTs and industry groups to stay updated on emerging TTPs. Finally, implement robust data exfiltration detection mechanisms, such as anomaly-based network monitoring and data loss prevention (DLP) tools, to identify unauthorized data transfers.
Affected Countries
India, United Kingdom, Germany, France, Italy
Indicators of Compromise
- url: https://adobe-acrobat.in
- url: https://adobe-acrobat.in/a.rar
- url: https://adobe-acrobat.in/msedge.rar
- url: https://adobe-acrobat.in/wchost.rar
- url: https://adobereader-update.in/msedge.rar
- url: https://adobereader-update.in/taskmgr.rar
- url: https://adobereader-upgrade.in/tmp.rar
- url: https://adobereader-upgrade.in/tmp1.rar
- url: https://adobreader-upgrade.in
- url: https://bsn.halsoftsoftsite.com
- url: https://govt-filesharing.site/a9.rar
- url: https://govt-filesharing.site/svchost.rar
- url: https://govt-filesharing.site/taskmgr.rar
- url: https://govt-filesharing.site/tmp.rar
- url: https://halsoftsoftsite.com
- url: https://listsoft-update.site/
- domain: adobe-acrobat.in
- domain: adobereader-update.in
- domain: adobereader-upgrade.in
- domain: adobreader-upgrade.in
- domain: govt-filesharing.site
- domain: halsoftsoftsite.com
- domain: listsoft-update.site
- domain: bsn.halsoftsoftsite.com
- hash: 0d86b8039cffc384856e17912f308616
- hash: 10a7725f807056cb0383a1cae38d49b4
- hash: 2e4e4ea817ad2286616f809ca84fc932
- hash: 8577f613b3aec5c1c90118b15eea8756
- hash: 9b9c574cdb17c238df80414476228a78
- hash: b531b8d72561cb5c88d97986e450bbae
- hash: c876a70380738236ee28aab60a2cde6e
- hash: e26b3fece2fe296654406ef8045ffda1
- hash: f2284f62625f117c57384b1c5b8b8f58
- hash: f2a71b2719744765ac8a6a49b2acbce6
- hash: f454e2724a63cbbfda26daff1d8bb610
- hash: f4813d65cd7246f716fcbd8f7fd3e63d
- hash: 0041636465cad79518a06d528e76393f442bf495
- hash: 3c17dbf975af8eb7a67e6908f522c93c2c0662e5
- hash: 3d48ab9567c6080471459b34dfc12c89418be8a2
- hash: 4c33100babea20749ff0957f50b174046bc6489d
- hash: 54bfe1ffba8bff3571093ade5038dc98ef5f46ce
- hash: 6036098059fa1311866ce6ad2723c4d0d1f00138
- hash: 667785fdde357ae65a6668545c6c013190dc9368
- hash: 699329d64308a172c6cf7f83712215490fc0b604
- hash: 6a11c0e5f1d1e22e89b4921c7a371dbf9cf54709
- hash: 6d1dbd92f7ed7381c7bfca681c3139daeab692f1
- hash: ccd0228e9c1bdb4c355d67c98a3233bb1fa085ac
- hash: 03edba9908a2f9e1012237d216e894029bd58f9121027e35f80d7b701d30ca95
- hash: 23327fe1158c2e1229dfac028c461eb331686e5c5c04f33af7a042676806a962
- hash: 3f2a52ec2dd2d6614115687325f1da9e028937f8a16bccc347de8c71c3aa87e1
- hash: 5d9b2e61ed45b6407b778a18ff87792265fa068d7c4580ae54fbf88af435679f
- hash: 6c60e5b28e352375d101eb0954fa98d229de3b94f22d5815af8948ebed1f44dd
- hash: 7434a71a8302462d56fee876c74cf3595cba9f2ca6940b3a11ece8aa064fcbaa
- hash: 8f495603be80b513820a948d51723b616fac33f0f382fa4a141e39e12fff40cf
- hash: 95a2fb8b6c7b74a7f598819810ddb0a505f3d5cf392b857ff8e75c5a1401110e
- hash: 99c3e908277df232d7170e1ea0697f79047c7f5610524bd11dc571fe4d84696b
- hash: af01c12019a3a3aa64e8a99d7231e0f2af6084298733bba3d7d41db13091cbac
- hash: fff79ce90b1af67e0b6d16a850e85861c948f988eda39ef46457241bbe3df170
- url: http://adobe-acrobat.in/ninevmc987.php?file=bncoeeav34564cvv94adfavc3354334dfsf
- url: https://adobe-acrobat.in/adobe_reader_setup.php?file=Adobe_Acrobat_Reader_Installation_Setup
- url: https://adobe-acrobat.in/ninevmc987.php?file=bncoeeav34564cvv94adfavc3354334dfsf
- url: https://adobecloud.site/adobe_installer.php?file=Adobe_Acrobat_Installer
- url: https://adobereader-upgrade.in/adobe_update.php?file=Adobe_Acrobat_Reader_Installation
- url: https://govt-filesharing.site/hpc5985.php?key=xvnd54&info=Hello
- domain: adobecloud.site
APT Attacks Target Indian Government Using GOGITTER, GITSHELLPAD, and GOSHELL | Part 1
Description
A Pakistan-linked APT group conducted two campaigns targeting Indian government entities. The Gopher Strike campaign used PDFs with malicious links to deliver an ISO file containing GOGITTER, a Golang downloader that fetches payloads from private GitHub repositories. GITSHELLPAD, a Golang backdoor, was used for C2 communication via GitHub. GOSHELL, a Golang shellcode loader, deployed Cobalt Strike Beacon on specific hostnames. The attackers used various techniques including scheduled tasks for persistence, obfuscation, and environmental keying. Post-compromise activities involved system reconnaissance and data exfiltration. The campaign demonstrated sophisticated TTPs and custom-built tools, indicating a potentially new subgroup or parallel Pakistan-linked threat actor.
AI-Powered Analysis
Technical Analysis
This threat involves a Pakistan-linked advanced persistent threat group, APT36, conducting targeted cyber espionage campaigns against Indian government entities. The attackers use a multi-stage infection chain starting with weaponized PDFs containing malicious links that deliver ISO files. These ISO files deploy GOGITTER, a downloader written in Golang, which retrieves additional payloads from private GitHub repositories, leveraging GitHub as a covert command and control (C2) infrastructure. GITSHELLPAD, another Golang-based backdoor, facilitates C2 communication through GitHub, enabling stealthy command execution and data exfiltration. GOSHELL, a Golang shellcode loader, is used to deploy Cobalt Strike Beacon on specific hostnames, providing the attackers with a powerful post-exploitation framework for lateral movement, persistence, and further reconnaissance. The attackers utilize scheduled tasks for persistence, obfuscation techniques to hinder analysis, and environmental keying to ensure payloads execute only in intended environments, reducing the risk of detection. Post-compromise activities include system reconnaissance (e.g., gathering system information and network details) and data exfiltration, indicating espionage objectives. The use of Golang for malware development enhances cross-platform capabilities and complicates detection due to less common signatures. The campaign's sophistication and custom tooling suggest the emergence of a new subgroup or parallel actor within the Pakistan-linked APT ecosystem. No public exploits are currently known, and the campaign is ongoing as of early 2026.
Potential Impact
For European organizations, the direct impact of this specific campaign is currently limited due to its targeting of Indian government entities. However, the use of GitHub as a C2 channel and Golang-based malware indicates a trend that could be adopted by similar threat actors targeting European governments or critical infrastructure. The techniques employed—such as environmental keying and scheduled task persistence—demonstrate advanced evasion capabilities that could challenge European defenders if adapted against their networks. Additionally, the deployment of Cobalt Strike Beacon, a widely used post-exploitation tool, could facilitate extensive lateral movement and data theft if similar campaigns target European entities. The indirect impact includes the potential for supply chain or third-party compromise via GitHub repositories, which are globally accessible. European organizations should be aware of the evolving TTPs and prepare for possible spillover or targeting of their government or critical sectors. The espionage nature of the campaign highlights risks to confidentiality and integrity of sensitive information.
Mitigation Recommendations
European organizations should implement advanced monitoring of network traffic for unusual GitHub API or repository access patterns, especially from internal systems. Deploy endpoint detection and response (EDR) solutions capable of detecting Golang-based malware and Cobalt Strike Beacon activity, including behavioral indicators such as scheduled task creation and shellcode injection. Enforce strict access controls and multi-factor authentication (MFA) on developer and operational GitHub accounts to prevent abuse of private repositories. Conduct threat hunting exercises focusing on indicators of compromise related to scheduled tasks, environmental keying, and obfuscated binaries. Network segmentation and least privilege principles should be applied to limit lateral movement potential. Regularly audit and monitor ISO and PDF file handling policies to reduce the risk of initial infection vectors. Employ threat intelligence sharing with national CERTs and industry groups to stay updated on emerging TTPs. Finally, implement robust data exfiltration detection mechanisms, such as anomaly-based network monitoring and data loss prevention (DLP) tools, to identify unauthorized data transfers.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.zscaler.com/blogs/security-research/apt-attacks-target-indian-government-using-gogitter-gitshellpad-and-goshell"]
- Adversary
- APT36
- Pulse Id
- 6977da59fb7a0679c7535c14
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://adobe-acrobat.in | — | |
urlhttps://adobe-acrobat.in/a.rar | — | |
urlhttps://adobe-acrobat.in/msedge.rar | — | |
urlhttps://adobe-acrobat.in/wchost.rar | — | |
urlhttps://adobereader-update.in/msedge.rar | — | |
urlhttps://adobereader-update.in/taskmgr.rar | — | |
urlhttps://adobereader-upgrade.in/tmp.rar | — | |
urlhttps://adobereader-upgrade.in/tmp1.rar | — | |
urlhttps://adobreader-upgrade.in | — | |
urlhttps://bsn.halsoftsoftsite.com | — | |
urlhttps://govt-filesharing.site/a9.rar | — | |
urlhttps://govt-filesharing.site/svchost.rar | — | |
urlhttps://govt-filesharing.site/taskmgr.rar | — | |
urlhttps://govt-filesharing.site/tmp.rar | — | |
urlhttps://halsoftsoftsite.com | — | |
urlhttps://listsoft-update.site/ | — | |
urlhttp://adobe-acrobat.in/ninevmc987.php?file=bncoeeav34564cvv94adfavc3354334dfsf | — | |
urlhttps://adobe-acrobat.in/adobe_reader_setup.php?file=Adobe_Acrobat_Reader_Installation_Setup | — | |
urlhttps://adobe-acrobat.in/ninevmc987.php?file=bncoeeav34564cvv94adfavc3354334dfsf | — | |
urlhttps://adobecloud.site/adobe_installer.php?file=Adobe_Acrobat_Installer | — | |
urlhttps://adobereader-upgrade.in/adobe_update.php?file=Adobe_Acrobat_Reader_Installation | — | |
urlhttps://govt-filesharing.site/hpc5985.php?key=xvnd54&info=Hello | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainadobe-acrobat.in | — | |
domainadobereader-update.in | — | |
domainadobereader-upgrade.in | — | |
domainadobreader-upgrade.in | — | |
domaingovt-filesharing.site | — | |
domainhalsoftsoftsite.com | — | |
domainlistsoft-update.site | — | |
domainbsn.halsoftsoftsite.com | — | |
domainadobecloud.site | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash0d86b8039cffc384856e17912f308616 | — | |
hash10a7725f807056cb0383a1cae38d49b4 | — | |
hash2e4e4ea817ad2286616f809ca84fc932 | — | |
hash8577f613b3aec5c1c90118b15eea8756 | — | |
hash9b9c574cdb17c238df80414476228a78 | — | |
hashb531b8d72561cb5c88d97986e450bbae | — | |
hashc876a70380738236ee28aab60a2cde6e | — | |
hashe26b3fece2fe296654406ef8045ffda1 | — | |
hashf2284f62625f117c57384b1c5b8b8f58 | — | |
hashf2a71b2719744765ac8a6a49b2acbce6 | — | |
hashf454e2724a63cbbfda26daff1d8bb610 | — | |
hashf4813d65cd7246f716fcbd8f7fd3e63d | — | |
hash0041636465cad79518a06d528e76393f442bf495 | — | |
hash3c17dbf975af8eb7a67e6908f522c93c2c0662e5 | — | |
hash3d48ab9567c6080471459b34dfc12c89418be8a2 | — | |
hash4c33100babea20749ff0957f50b174046bc6489d | — | |
hash54bfe1ffba8bff3571093ade5038dc98ef5f46ce | — | |
hash6036098059fa1311866ce6ad2723c4d0d1f00138 | — | |
hash667785fdde357ae65a6668545c6c013190dc9368 | — | |
hash699329d64308a172c6cf7f83712215490fc0b604 | — | |
hash6a11c0e5f1d1e22e89b4921c7a371dbf9cf54709 | — | |
hash6d1dbd92f7ed7381c7bfca681c3139daeab692f1 | — | |
hashccd0228e9c1bdb4c355d67c98a3233bb1fa085ac | — | |
hash03edba9908a2f9e1012237d216e894029bd58f9121027e35f80d7b701d30ca95 | — | |
hash23327fe1158c2e1229dfac028c461eb331686e5c5c04f33af7a042676806a962 | — | |
hash3f2a52ec2dd2d6614115687325f1da9e028937f8a16bccc347de8c71c3aa87e1 | — | |
hash5d9b2e61ed45b6407b778a18ff87792265fa068d7c4580ae54fbf88af435679f | — | |
hash6c60e5b28e352375d101eb0954fa98d229de3b94f22d5815af8948ebed1f44dd | — | |
hash7434a71a8302462d56fee876c74cf3595cba9f2ca6940b3a11ece8aa064fcbaa | — | |
hash8f495603be80b513820a948d51723b616fac33f0f382fa4a141e39e12fff40cf | — | |
hash95a2fb8b6c7b74a7f598819810ddb0a505f3d5cf392b857ff8e75c5a1401110e | — | |
hash99c3e908277df232d7170e1ea0697f79047c7f5610524bd11dc571fe4d84696b | — | |
hashaf01c12019a3a3aa64e8a99d7231e0f2af6084298733bba3d7d41db13091cbac | — | |
hashfff79ce90b1af67e0b6d16a850e85861c948f988eda39ef46457241bbe3df170 | — |
Threat ID: 69786adc4623b1157c0a63cd
Added to database: 1/27/2026, 7:35:56 AM
Last enriched: 1/27/2026, 7:50:17 AM
Last updated: 2/7/2026, 2:41:15 AM
Views: 236
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-06
MediumThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.