Indian Income Tax-Themed Phishing Campaign Targets Local Businesses
A sophisticated phishing campaign impersonating the Indian Income Tax Department has been targeting local businesses. The attack begins with a spear-phishing email containing a PDF attachment that directs victims to a fake compliance portal. This triggers the download of a malicious ZIP file, which initiates a multi-stage infection chain. The payload, delivered through NSIS installers, deploys a Remote Access Trojan (RAT) with persistence capabilities. The malware harvests system information and establishes communication with command and control servers. Technical indicators suggest a China-linked development environment. This campaign demonstrates how seemingly simple tax-themed phishing can lead to complete device compromise, emphasizing the need for heightened security awareness.
AI Analysis
Technical Summary
This threat involves a multi-stage phishing campaign that begins with spear-phishing emails impersonating the Indian Income Tax Department, targeting local Indian businesses. The emails contain PDF attachments that direct victims to a counterfeit compliance portal designed to appear legitimate. Upon interaction, the portal triggers the download of a malicious ZIP archive. This archive contains NSIS (Nullsoft Scriptable Install System) installers which execute a complex infection chain. The final payload is a Remote Access Trojan (RAT) that establishes persistence on the infected system by creating services and masquerading as legitimate processes. The RAT harvests detailed system information and maintains communication with command and control (C2) servers to receive commands and exfiltrate data. The campaign employs multiple MITRE ATT&CK techniques including spear-phishing (T1566.001, T1566.002), persistence via service creation (T1543.003), masquerading (T1036), data staging (T1074), and others related to execution, defense evasion, and command and control. Indicators of compromise include a specific file hash (4001854be1ae8e12b6dda124679a4077), IP address (154.91.84.3), and domain (www.akjys.top). Attribution is uncertain but technical evidence points to a China-linked development environment. The campaign exemplifies how social engineering themed around tax compliance can lead to full device compromise and persistent unauthorized access.
Potential Impact
For European organizations, the direct impact is limited due to the campaign’s focus on Indian local businesses. However, European companies with subsidiaries, partners, or clients in India could be at risk if employees receive similar phishing emails or if attackers pivot through compromised Indian entities. The RAT’s capabilities for persistent remote access and data harvesting pose significant risks to confidentiality, integrity, and availability of affected systems. Compromise could lead to intellectual property theft, espionage, lateral movement within networks, and potential disruption of business operations. The multi-stage infection chain and use of NSIS installers complicate detection and remediation efforts. Furthermore, the campaign highlights the risk of supply chain or third-party exposure, where European firms connected to Indian businesses might face indirect threats. Overall, this campaign underscores the importance of defending against targeted phishing and malware campaigns exploiting regional tax themes, especially for organizations with cross-border business relationships.
Mitigation Recommendations
1. Deploy advanced email filtering and sandboxing solutions to detect and block spear-phishing emails, especially those containing PDFs and ZIP files. 2. Conduct targeted security awareness training emphasizing the risks of tax-themed phishing and the importance of verifying unexpected tax-related communications through official channels. 3. Implement Endpoint Detection and Response (EDR) tools capable of detecting NSIS installer execution, persistence mechanisms, and anomalous outbound network connections to suspicious domains or IP addresses. 4. Monitor and block network traffic to known malicious infrastructure such as the domain www.akjys.top and IP 154.91.84.3 at firewall and proxy levels. 5. Enforce application whitelisting to prevent unauthorized execution of installers and unknown binaries. 6. Regularly audit and restrict privileges related to service creation to limit malware persistence opportunities. 7. Maintain up-to-date threat intelligence feeds to stay informed about emerging phishing campaigns and indicators of compromise. 8. Establish and rehearse incident response procedures to quickly isolate and remediate infected systems. 9. For organizations with Indian business ties, implement additional scrutiny on tax-related communications and verify authenticity through official government channels. 10. Use multi-factor authentication and network segmentation to reduce the impact and lateral movement potential of RAT infections.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain
Indicators of Compromise
- hash: 4001854be1ae8e12b6dda124679a4077
- ip: 154.91.84.3
- url: https://www.akjys.top/
- domain: www.akjys.top
Indian Income Tax-Themed Phishing Campaign Targets Local Businesses
Description
A sophisticated phishing campaign impersonating the Indian Income Tax Department has been targeting local businesses. The attack begins with a spear-phishing email containing a PDF attachment that directs victims to a fake compliance portal. This triggers the download of a malicious ZIP file, which initiates a multi-stage infection chain. The payload, delivered through NSIS installers, deploys a Remote Access Trojan (RAT) with persistence capabilities. The malware harvests system information and establishes communication with command and control servers. Technical indicators suggest a China-linked development environment. This campaign demonstrates how seemingly simple tax-themed phishing can lead to complete device compromise, emphasizing the need for heightened security awareness.
AI-Powered Analysis
Technical Analysis
This threat involves a multi-stage phishing campaign that begins with spear-phishing emails impersonating the Indian Income Tax Department, targeting local Indian businesses. The emails contain PDF attachments that direct victims to a counterfeit compliance portal designed to appear legitimate. Upon interaction, the portal triggers the download of a malicious ZIP archive. This archive contains NSIS (Nullsoft Scriptable Install System) installers which execute a complex infection chain. The final payload is a Remote Access Trojan (RAT) that establishes persistence on the infected system by creating services and masquerading as legitimate processes. The RAT harvests detailed system information and maintains communication with command and control (C2) servers to receive commands and exfiltrate data. The campaign employs multiple MITRE ATT&CK techniques including spear-phishing (T1566.001, T1566.002), persistence via service creation (T1543.003), masquerading (T1036), data staging (T1074), and others related to execution, defense evasion, and command and control. Indicators of compromise include a specific file hash (4001854be1ae8e12b6dda124679a4077), IP address (154.91.84.3), and domain (www.akjys.top). Attribution is uncertain but technical evidence points to a China-linked development environment. The campaign exemplifies how social engineering themed around tax compliance can lead to full device compromise and persistent unauthorized access.
Potential Impact
For European organizations, the direct impact is limited due to the campaign’s focus on Indian local businesses. However, European companies with subsidiaries, partners, or clients in India could be at risk if employees receive similar phishing emails or if attackers pivot through compromised Indian entities. The RAT’s capabilities for persistent remote access and data harvesting pose significant risks to confidentiality, integrity, and availability of affected systems. Compromise could lead to intellectual property theft, espionage, lateral movement within networks, and potential disruption of business operations. The multi-stage infection chain and use of NSIS installers complicate detection and remediation efforts. Furthermore, the campaign highlights the risk of supply chain or third-party exposure, where European firms connected to Indian businesses might face indirect threats. Overall, this campaign underscores the importance of defending against targeted phishing and malware campaigns exploiting regional tax themes, especially for organizations with cross-border business relationships.
Mitigation Recommendations
1. Deploy advanced email filtering and sandboxing solutions to detect and block spear-phishing emails, especially those containing PDFs and ZIP files. 2. Conduct targeted security awareness training emphasizing the risks of tax-themed phishing and the importance of verifying unexpected tax-related communications through official channels. 3. Implement Endpoint Detection and Response (EDR) tools capable of detecting NSIS installer execution, persistence mechanisms, and anomalous outbound network connections to suspicious domains or IP addresses. 4. Monitor and block network traffic to known malicious infrastructure such as the domain www.akjys.top and IP 154.91.84.3 at firewall and proxy levels. 5. Enforce application whitelisting to prevent unauthorized execution of installers and unknown binaries. 6. Regularly audit and restrict privileges related to service creation to limit malware persistence opportunities. 7. Maintain up-to-date threat intelligence feeds to stay informed about emerging phishing campaigns and indicators of compromise. 8. Establish and rehearse incident response procedures to quickly isolate and remediate infected systems. 9. For organizations with Indian business ties, implement additional scrutiny on tax-related communications and verify authenticity through official government channels. 10. Use multi-factor authentication and network segmentation to reduce the impact and lateral movement potential of RAT infections.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/indian-income-tax-themed-phishing-campaign-targets-local-businesses/"]
- Adversary
- null
- Pulse Id
- 69497ab3f381b44007add888
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash4001854be1ae8e12b6dda124679a4077 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip154.91.84.3 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://www.akjys.top/ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainwww.akjys.top | — |
Threat ID: 694a5f2d033f6f66d772eb0d
Added to database: 12/23/2025, 9:21:49 AM
Last enriched: 1/5/2026, 11:08:52 AM
Last updated: 2/7/2026, 8:44:47 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
MediumThreatFox IOCs for 2026-02-06
MediumThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.