Skip to main content

Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware

Medium
Published: Sat Jun 21 2025 (06/21/2025, 14:51:24 UTC)
Source: AlienVault OTX General

Description

APT36, a Pakistan-based cyber espionage group, is actively targeting Indian defense personnel through sophisticated phishing campaigns. The group disseminates emails with malicious PDF attachments resembling official government documents. When opened, these PDFs display a blurred background and a button mimicking the National Informatics Centre login interface. Clicking the button redirects users to a fraudulent URL and initiates the download of a ZIP archive containing a malicious executable disguised as a legitimate application. This campaign highlights APT36's focus on credential theft and long-term infiltration of Indian defense networks, emphasizing the need for robust email security, user awareness programs, and proactive threat detection systems.

AI-Powered Analysis

AILast updated: 06/24/2025, 14:19:15 UTC

Technical Analysis

This threat involves a sophisticated phishing campaign orchestrated by APT36, a Pakistan-based cyber espionage group known for targeting Indian defense entities. The campaign uses carefully crafted emails containing malicious PDF attachments that impersonate official government documents. When the targeted user opens the PDF, it displays a blurred background with a button designed to mimic the National Informatics Centre (NIC) login interface, a trusted Indian government portal. Clicking the button redirects the user to a fraudulent website URL, which initiates the download of a ZIP archive containing a malicious executable. This executable is disguised as a legitimate application to evade suspicion. The primary objective of this campaign is credential theft, enabling long-term infiltration and espionage within Indian defense networks. The attack chain leverages social engineering, malware delivery, and credential harvesting techniques. Indicators of compromise include multiple file hashes, IP addresses, and domains associated with the campaign. The campaign does not exploit software vulnerabilities but relies on user interaction and deception to succeed. The malware likely employs persistence and evasion tactics to maintain access and avoid detection, consistent with APT36’s known tactics, techniques, and procedures (TTPs).

Potential Impact

While the campaign specifically targets Indian defense personnel, European organizations could be indirectly impacted if similar tactics are adopted against European defense or government sectors, or if European entities collaborate with Indian defense or related industries. Credential theft can lead to unauthorized access, data exfiltration, espionage, and potential disruption of sensitive operations. For European organizations, especially those involved in defense, critical infrastructure, or government services, such phishing campaigns could compromise confidential information, damage national security interests, and undermine trust in digital communications. The campaign’s reliance on social engineering and malware delivery means that even well-secured networks could be vulnerable if user awareness is low. Additionally, the presence of multiple malicious domains and IPs indicates a broad infrastructure that could be repurposed or expanded to target European entities. The long-term infiltration potential poses risks of persistent espionage and data compromise.

Mitigation Recommendations

1. Implement advanced email filtering solutions that can detect and quarantine phishing emails with malicious attachments, especially those containing PDFs with embedded links or buttons. 2. Deploy endpoint detection and response (EDR) tools capable of identifying and blocking execution of suspicious executables, particularly those delivered via ZIP archives. 3. Conduct targeted user awareness and training programs focusing on recognizing phishing attempts that impersonate government or official entities, emphasizing caution with unexpected attachments and links. 4. Enforce multi-factor authentication (MFA) on all critical systems and portals to reduce the risk of credential misuse even if credentials are stolen. 5. Monitor network traffic for connections to known malicious IP addresses and domains associated with this campaign, and block or alert on such communications. 6. Regularly update and patch all systems to reduce the attack surface, even though this campaign does not exploit software vulnerabilities directly. 7. Establish incident response playbooks specifically for phishing and credential theft scenarios, including rapid containment and forensic analysis. 8. Collaborate with national cybersecurity centers and threat intelligence sharing platforms to stay informed about evolving TTPs of APT36 and similar groups.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.cyfirma.com/research/apt36-phishing-campaign-targets-indian-defense-using-credential-stealing-malware"]
Adversary
APT36
Pulse Id
6856c6ec76846d013ef77cc6
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash154f4cdcd4b822314293ad566d7255fa
hash6ee3b0f4cb84e18751e7088043741e9a
hashcdb9fb87dcb44d8f3040f4fb87d89508
hash55972edf001fd5afb1045bd96da835841c39fec4e3d47643e6a5dd793c904332
hash55b7e20e42b57a32db29ea3f65d0fd2b2858aaeb9307b0ebbcdad1b0fcfd8059
hashf03ac870cb91c00b51ddf29b6028d9ddf42477970eafa7c556e3a3d74ada25c9
hashe56b947bd92baecd7e75f36bab1a9afb53f856a3

Ip

ValueDescriptionCopy
ip162.254.38.217
ip217.114.10.11

Domain

ValueDescriptionCopy
domain55cc.info
domain59292406.xyz
domainboldcatchpoint.shop
domainchillchad.xyz
domainggpoker.xyz
domainkp85.cyou
domainmczacji.top
domainmegasofteware.net
domainrapio.site
domainservisyeni.xyz
domainslotgacorterbaru.xyz
domainsuperprimeservices.com
domainvipwin.buzz
domainwholly-well.info
domainworrr19.sbs
domainzhangthird.shop

Threat ID: 685ab3b48e5e669c7fb5ad00

Added to database: 6/24/2025, 2:18:28 PM

Last enriched: 6/24/2025, 2:19:15 PM

Last updated: 8/17/2025, 8:52:44 PM

Views: 43

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats