Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

APT Attacks Target Indian Government Using GOGITTER, GITSHELLPAD, and GOSHELL | Part 1

0
Medium
Published: Mon Jan 26 2026 (01/26/2026, 21:19:21 UTC)
Source: AlienVault OTX General

Description

A Pakistan-linked APT group conducted two campaigns targeting Indian government entities. The Gopher Strike campaign used PDFs with malicious links to deliver an ISO file containing GOGITTER, a Golang downloader that fetches payloads from private GitHub repositories. GITSHELLPAD, a Golang backdoor, was used for C2 communication via GitHub. GOSHELL, a Golang shellcode loader, deployed Cobalt Strike Beacon on specific hostnames. The attackers used various techniques including scheduled tasks for persistence, obfuscation, and environmental keying. Post-compromise activities involved system reconnaissance and data exfiltration. The campaign demonstrated sophisticated TTPs and custom-built tools, indicating a potentially new subgroup or parallel Pakistan-linked threat actor.

AI-Powered Analysis

AILast updated: 01/27/2026, 07:50:17 UTC

Technical Analysis

This threat involves a Pakistan-linked advanced persistent threat group, APT36, conducting targeted cyber espionage campaigns against Indian government entities. The attackers use a multi-stage infection chain starting with weaponized PDFs containing malicious links that deliver ISO files. These ISO files deploy GOGITTER, a downloader written in Golang, which retrieves additional payloads from private GitHub repositories, leveraging GitHub as a covert command and control (C2) infrastructure. GITSHELLPAD, another Golang-based backdoor, facilitates C2 communication through GitHub, enabling stealthy command execution and data exfiltration. GOSHELL, a Golang shellcode loader, is used to deploy Cobalt Strike Beacon on specific hostnames, providing the attackers with a powerful post-exploitation framework for lateral movement, persistence, and further reconnaissance. The attackers utilize scheduled tasks for persistence, obfuscation techniques to hinder analysis, and environmental keying to ensure payloads execute only in intended environments, reducing the risk of detection. Post-compromise activities include system reconnaissance (e.g., gathering system information and network details) and data exfiltration, indicating espionage objectives. The use of Golang for malware development enhances cross-platform capabilities and complicates detection due to less common signatures. The campaign's sophistication and custom tooling suggest the emergence of a new subgroup or parallel actor within the Pakistan-linked APT ecosystem. No public exploits are currently known, and the campaign is ongoing as of early 2026.

Potential Impact

For European organizations, the direct impact of this specific campaign is currently limited due to its targeting of Indian government entities. However, the use of GitHub as a C2 channel and Golang-based malware indicates a trend that could be adopted by similar threat actors targeting European governments or critical infrastructure. The techniques employed—such as environmental keying and scheduled task persistence—demonstrate advanced evasion capabilities that could challenge European defenders if adapted against their networks. Additionally, the deployment of Cobalt Strike Beacon, a widely used post-exploitation tool, could facilitate extensive lateral movement and data theft if similar campaigns target European entities. The indirect impact includes the potential for supply chain or third-party compromise via GitHub repositories, which are globally accessible. European organizations should be aware of the evolving TTPs and prepare for possible spillover or targeting of their government or critical sectors. The espionage nature of the campaign highlights risks to confidentiality and integrity of sensitive information.

Mitigation Recommendations

European organizations should implement advanced monitoring of network traffic for unusual GitHub API or repository access patterns, especially from internal systems. Deploy endpoint detection and response (EDR) solutions capable of detecting Golang-based malware and Cobalt Strike Beacon activity, including behavioral indicators such as scheduled task creation and shellcode injection. Enforce strict access controls and multi-factor authentication (MFA) on developer and operational GitHub accounts to prevent abuse of private repositories. Conduct threat hunting exercises focusing on indicators of compromise related to scheduled tasks, environmental keying, and obfuscated binaries. Network segmentation and least privilege principles should be applied to limit lateral movement potential. Regularly audit and monitor ISO and PDF file handling policies to reduce the risk of initial infection vectors. Employ threat intelligence sharing with national CERTs and industry groups to stay updated on emerging TTPs. Finally, implement robust data exfiltration detection mechanisms, such as anomaly-based network monitoring and data loss prevention (DLP) tools, to identify unauthorized data transfers.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/apt-attacks-target-indian-government-using-gogitter-gitshellpad-and-goshell"]
Adversary
APT36
Pulse Id
6977da59fb7a0679c7535c14
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://adobe-acrobat.in
urlhttps://adobe-acrobat.in/a.rar
urlhttps://adobe-acrobat.in/msedge.rar
urlhttps://adobe-acrobat.in/wchost.rar
urlhttps://adobereader-update.in/msedge.rar
urlhttps://adobereader-update.in/taskmgr.rar
urlhttps://adobereader-upgrade.in/tmp.rar
urlhttps://adobereader-upgrade.in/tmp1.rar
urlhttps://adobreader-upgrade.in
urlhttps://bsn.halsoftsoftsite.com
urlhttps://govt-filesharing.site/a9.rar
urlhttps://govt-filesharing.site/svchost.rar
urlhttps://govt-filesharing.site/taskmgr.rar
urlhttps://govt-filesharing.site/tmp.rar
urlhttps://halsoftsoftsite.com
urlhttps://listsoft-update.site/
urlhttp://adobe-acrobat.in/ninevmc987.php?file=bncoeeav34564cvv94adfavc3354334dfsf
urlhttps://adobe-acrobat.in/adobe_reader_setup.php?file=Adobe_Acrobat_Reader_Installation_Setup
urlhttps://adobe-acrobat.in/ninevmc987.php?file=bncoeeav34564cvv94adfavc3354334dfsf
urlhttps://adobecloud.site/adobe_installer.php?file=Adobe_Acrobat_Installer
urlhttps://adobereader-upgrade.in/adobe_update.php?file=Adobe_Acrobat_Reader_Installation
urlhttps://govt-filesharing.site/hpc5985.php?key=xvnd54&info=Hello

Domain

ValueDescriptionCopy
domainadobe-acrobat.in
domainadobereader-update.in
domainadobereader-upgrade.in
domainadobreader-upgrade.in
domaingovt-filesharing.site
domainhalsoftsoftsite.com
domainlistsoft-update.site
domainbsn.halsoftsoftsite.com
domainadobecloud.site

Hash

ValueDescriptionCopy
hash0d86b8039cffc384856e17912f308616
hash10a7725f807056cb0383a1cae38d49b4
hash2e4e4ea817ad2286616f809ca84fc932
hash8577f613b3aec5c1c90118b15eea8756
hash9b9c574cdb17c238df80414476228a78
hashb531b8d72561cb5c88d97986e450bbae
hashc876a70380738236ee28aab60a2cde6e
hashe26b3fece2fe296654406ef8045ffda1
hashf2284f62625f117c57384b1c5b8b8f58
hashf2a71b2719744765ac8a6a49b2acbce6
hashf454e2724a63cbbfda26daff1d8bb610
hashf4813d65cd7246f716fcbd8f7fd3e63d
hash0041636465cad79518a06d528e76393f442bf495
hash3c17dbf975af8eb7a67e6908f522c93c2c0662e5
hash3d48ab9567c6080471459b34dfc12c89418be8a2
hash4c33100babea20749ff0957f50b174046bc6489d
hash54bfe1ffba8bff3571093ade5038dc98ef5f46ce
hash6036098059fa1311866ce6ad2723c4d0d1f00138
hash667785fdde357ae65a6668545c6c013190dc9368
hash699329d64308a172c6cf7f83712215490fc0b604
hash6a11c0e5f1d1e22e89b4921c7a371dbf9cf54709
hash6d1dbd92f7ed7381c7bfca681c3139daeab692f1
hashccd0228e9c1bdb4c355d67c98a3233bb1fa085ac
hash03edba9908a2f9e1012237d216e894029bd58f9121027e35f80d7b701d30ca95
hash23327fe1158c2e1229dfac028c461eb331686e5c5c04f33af7a042676806a962
hash3f2a52ec2dd2d6614115687325f1da9e028937f8a16bccc347de8c71c3aa87e1
hash5d9b2e61ed45b6407b778a18ff87792265fa068d7c4580ae54fbf88af435679f
hash6c60e5b28e352375d101eb0954fa98d229de3b94f22d5815af8948ebed1f44dd
hash7434a71a8302462d56fee876c74cf3595cba9f2ca6940b3a11ece8aa064fcbaa
hash8f495603be80b513820a948d51723b616fac33f0f382fa4a141e39e12fff40cf
hash95a2fb8b6c7b74a7f598819810ddb0a505f3d5cf392b857ff8e75c5a1401110e
hash99c3e908277df232d7170e1ea0697f79047c7f5610524bd11dc571fe4d84696b
hashaf01c12019a3a3aa64e8a99d7231e0f2af6084298733bba3d7d41db13091cbac
hashfff79ce90b1af67e0b6d16a850e85861c948f988eda39ef46457241bbe3df170

Threat ID: 69786adc4623b1157c0a63cd

Added to database: 1/27/2026, 7:35:56 AM

Last enriched: 1/27/2026, 7:50:17 AM

Last updated: 2/7/2026, 2:41:15 AM

Views: 236

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats