Skip to main content

Indian Infrastructure Targeted with Desktop Lures and Poseidon Backdoor

Medium
Published: Fri Aug 01 2025 (08/01/2025, 12:31:23 UTC)
Source: AlienVault OTX General

Description

APT36, a Pakistan-linked threat group, has expanded its operations to target Indian government and civilian infrastructure, including railways, oil & gas, and the Ministry of External Affairs. The group employs sophisticated phishing techniques and novel payload strategies, using .desktop files disguised as PDF documents to execute malicious scripts. Two attack variants were identified, utilizing single and redundant command and control server setups. The Poseidon backdoor, built on the Mythic framework, is deployed for persistent access and lateral movement. Over 100 phishing domains impersonating Indian government organizations were discovered, primarily hosted by AlexHost. The campaign, active since early July 2025, poses a significant threat to Indian public sector and critical infrastructure.

AI-Powered Analysis

AILast updated: 08/01/2025, 12:47:45 UTC

Technical Analysis

The threat involves APT36, a Pakistan-linked advanced persistent threat group, targeting Indian government and civilian infrastructure sectors such as railways, oil & gas, and the Ministry of External Affairs. The group employs sophisticated phishing campaigns using deceptive .desktop files disguised as PDF documents to execute malicious scripts on victim machines. These files exploit user trust and social engineering to bypass security controls and initiate payload execution. Two variants of the attack have been identified, differing in their command and control (C2) server architecture—one using a single C2 server and another employing redundant C2 servers to enhance resilience and persistence. The primary malware deployed is the Poseidon backdoor, which is built on the Mythic framework, a modular and flexible post-exploitation toolset. Poseidon enables persistent access, lateral movement within networks, credential theft, and data exfiltration. The campaign also involves over 100 phishing domains impersonating Indian government organizations, primarily hosted by AlexHost, to increase the credibility of phishing lures and facilitate credential harvesting or malware delivery. The campaign has been active since early July 2025 and represents a significant threat to Indian public sector entities and critical infrastructure. The attack techniques align with multiple MITRE ATT&CK tactics and techniques including phishing (T1566), execution via user execution (T1204), persistence (T1547), lateral movement (T1071), and defense evasion (T1070, T1027). The use of .desktop files as lures is novel and leverages Linux desktop environments, indicating targeting of systems running Linux or Unix-like OSes, which are common in infrastructure environments. The absence of known exploits in the wild suggests the threat relies heavily on social engineering and custom malware deployment rather than exploiting publicly known vulnerabilities.

Potential Impact

For European organizations, the direct impact of this specific campaign may be limited given the targeting focus on Indian infrastructure and government entities. However, the tactics and malware used by APT36, including the Poseidon backdoor and sophisticated phishing with desktop lures, represent a broader threat model that could be adapted against European critical infrastructure or government targets. The use of novel delivery mechanisms such as .desktop files disguised as PDFs could bypass traditional email security filters and endpoint protections if similar campaigns were launched in Europe. European organizations operating in sectors like energy, transportation, and government should be aware of the potential for similar threat actor tactics to be used against them. Additionally, the hosting provider AlexHost, used for phishing domains, may also host malicious infrastructure targeting European entities, warranting monitoring. The lateral movement and persistence capabilities of the Poseidon backdoor pose risks of prolonged undetected intrusions, data theft, and operational disruption if deployed successfully. The campaign underscores the need for vigilance against social engineering and the importance of securing Linux-based infrastructure components, which are prevalent in European critical sectors.

Mitigation Recommendations

1. Implement advanced email filtering and sandboxing solutions that can detect and block phishing emails containing deceptive .desktop files or other unusual attachments. 2. Educate users, especially those in critical infrastructure sectors, on the risks of opening unexpected attachments, particularly files with uncommon extensions like .desktop, even if they appear to be PDFs. 3. Enforce strict application whitelisting and execution policies on Linux and Unix-like systems to prevent unauthorized script execution from user directories or email downloads. 4. Monitor network traffic for unusual outbound connections, especially to known or suspicious C2 servers, and implement DNS filtering to block access to phishing domains impersonating government organizations. 5. Deploy endpoint detection and response (EDR) solutions capable of identifying behaviors associated with the Mythic framework and Poseidon backdoor, such as lateral movement, credential dumping, and persistence mechanisms. 6. Regularly audit and harden Linux-based infrastructure, ensuring timely patching and removal of unnecessary services to reduce attack surface. 7. Collaborate with hosting providers like AlexHost to identify and take down phishing domains used in such campaigns. 8. Conduct threat hunting exercises focused on detecting indicators of compromise related to APT36 tactics and Poseidon backdoor activity. 9. Implement multi-factor authentication (MFA) across all critical systems to reduce the impact of credential theft. 10. Establish incident response plans tailored to address advanced persistent threats targeting infrastructure and government sectors.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://hunt.io/blog/apt36-india-infrastructure-attacks"]
Adversary
APT36
Pulse Id
688cb39bdc1c258f2b66a6e8
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip165.22.251.224
ip178.128.204.138
ip165.232.114.63
ip209.38.203.53
ip37.221.64.202
ip64.227.189.57

Hash

ValueDescriptionCopy
hash589cf2077569b95178408f364a1aa721
hash5c71c683ff55530c73477e0ff47a1899
hash6065407484f1e22e814dfa00bd1fae06
hash65167974b397493fce320005916a13e9
hash76e9ff3c325de4f2d52f9881422a88cb
hash8d46a7e4a800d15e31fb0aa86d4d7b7f
hashb3f57fe1a541c364a5989046ac2cb9c5
hashe354cf4cc4177e019ad236f8b241ba3c
hash0c903f9e744c122421cf84af8b7df06b079aa097
hash1814730cb451b930573c6a52f047301bff0b84d1
hash5f071d91376596461e7bad56035842aae7f07b72
hashb6170fd0a1a75e043cd412300db4c67a351f71a6
hashf43cd71467b98f411b3b09bb6fae621f45684bf3
hash3326ba81b48ab03f7f49d2da70d3bbe4ea0e163d33e7399d528152b7c3da9170
hash38136d87e9687398f906687ea9886feead2da21ec18c2df96cc210e05619f26f
hash5c3472163ad4c1adcfebe15d1016058a5f020100f872ddcc3e692286abbae405
hash7a2f7357ce5ebd03bbf10b856a30706f71eb1586c309aff9169fb5b056791741
hash8441601f4bb59f529ff1130bd308b94d0a0785f660193f6a7a748071913f9045
hash8bb7fee18fc1cef3b3697472a6337f4bb432a6a44ebcaf4727e44ffdb4b21e33

Domain

ValueDescriptionCopy
domaindayenter.shop
domaindmsupport.live
domainnominationdrdo.report
domain37-221-64-252.cprapid.com
domainaccounts.mgovcloud.in.cloudshare.digital
domainaccounts.mgovcloud.in.indiagov.support
domainaccounts.mgovcloud.in.storagecloud.download
domaindrdo.gov.in.nominationdrdo.report
domainemail.gov.in.briefcases.email
domainemail.gov.in.defencedept.work
domainemail.gov.in.defenceindia.ltd
domainemail.gov.in.departmentofdefence.de
domainemail.gov.in.departmentofspace.info
domainemail.gov.in.indiadefencedepartment.link
domainemail.gov.in.indiandefence.work
domainemail.gov.in.indiangov.download
domainemail.gov.in.ministryofdefenceindia.org
domainemail.gov.in.modindia.link
domaingov.in.nominationdrdo.report
domainiaf.nic.in.ministryofdefenceindia.org
domainindianarmy.nic.in.departmentofdefence.de
domainindianarmy.nic.in.ministryofdefenceindia.org
domainindianarmy.nic.in.nominationdrdo.report
domainjkpolice.gov.in.kashmirattack.exposed
domainmea.gov.in.indiandefence.services
domainmod.gov.in.defencepersonnel.support
domainmod.gov.in.indiandefence.directory
domainmod.gov.in.indiandefence.services
domainmod.gov.in.modpersonnel.support
domainwww.email.gov.in.defenceindia.ltd
domainwww.email.gov.in.indiandefence.work
domainwww.email.gov.in.modindia.link
domainwww.mnscare.live
domainwww.mod.gov.in.indiandefence.services

Threat ID: 688cb3ecad5a09ad00c8cca0

Added to database: 8/1/2025, 12:32:44 PM

Last enriched: 8/1/2025, 12:47:45 PM

Last updated: 8/2/2025, 2:38:26 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats