Trending

#DeskRAT

Latest posts tagged with #DeskRAT on Bluesky

Latest Top
Trending

Posts tagged #DeskRAT

Preview
Cross-Platform Spyware Campaigns Target Indian Defense and Government Sectors   Cybersecurity researchers have identified multiple coordinated cyber espionage campaigns targeting organizations connected to India’s defense sector and government ecosystem. These operations are designed to infiltrate both Windows and Linux systems using remote access trojans that allow attackers to steal sensitive information and retain long-term control over compromised devices. The activity involves several spyware families, including Geta RAT, Ares RAT, and DeskRAT. These tools have been associated in open-source security reporting with threat clusters commonly tracked as SideCopy and APT36, also known as Transparent Tribe. Analysts assess that SideCopy has operated for several years and functions as an operational subset of the broader cluster. Rather than introducing radically new tactics, the actors appear to be refining established espionage techniques by expanding their reach across operating systems, using stealthier memory-resident methods, and experimenting with new delivery mechanisms to avoid detection while sustaining strategic targeting. Across the campaigns, initial access is commonly achieved through phishing emails that deliver malicious attachments or links to attacker-controlled servers. Victims are directed to open Windows shortcut files, Linux executables, or weaponized presentation add-ins. These files initiate multi-stage infection chains that install spyware while displaying decoy documents to reduce suspicion. One observed Windows attack chain abuses a legitimate system utility to retrieve and execute web-hosted malicious code from compromised, regionally trusted websites. The downloaded component decrypts an embedded library, writes a decoy PDF file to disk, contacts a command-and-control server, and opens the decoy for the user. Before deploying Geta RAT, the malware checks which security products are installed and modifies its persistence technique accordingly to improve survivability. This method has been documented in public research by multiple security vendors. Geta RAT enables extensive surveillance and control, including system profiling, listing and terminating processes, enumerating installed applications, credential theft, clipboard manipulation, screenshot capture, file management, command execution, and data extraction from connected USB devices. Parallel Linux-focused attacks begin with a loader written in Go that downloads a shell script to install a Python-based Ares RAT. This malware supports remote command execution, data collection, and the running of attacker-supplied scripts. In a separate infection chain, DeskRAT, a Golang-based backdoor, is delivered through a malicious presentation add-in that establishes outbound communication to retrieve the payload, a technique previously described in independent research. Researchers note that targets extend beyond defense to policy bodies, research institutions, critical infrastructure, and defense-adjacent organizations within the same trusted networks. The combined deployment of Geta RAT, Ares RAT, and DeskRAT reflects a developing toolkit optimized for stealth, persistence, and long-term intelligence collection.

Cross-Platform Spyware Campaigns Target Indian Defense and Government Sectors #cyberespionage #deskrat #IndianGovernment

0 0 0 0
Preview
Pakistan targets systems amid regional crises; Indian agencies smell a ‘DeskRAT’ New Delhi, Nov 8 (SocialNews.XYZ) At the start of 2025, following a high-level meeting in the national Capital, Indian Intelligence agencies had signalled that going into the future, New Delhi's major concerns on the security front would be cybercrime. While cybercrime has always been a threat to the security of the nation, the agencies have smelt a DeskRAT and have been picking up a new trend.

Pakistan targets systems amid regional crises; Indian agencies smell a 'DeskRAT' #Pakistan #Indian #DeskRAT #socialnewsxyz

0 0 0 0
Post image

1/3
🚨 Pakistan-linked Transparent Tribe (APT36) is targeting Indian gov’t entities with phishing lures delivering DeskRAT, a Golang-based backdoor. Malicious ZIPs deploy fake “CDS Directive” PDFs to hide infection activity. #APT36 #CyberEspionage #DeskRAT

1 0 1 0

APT36 targets Indian government entities with Golang-based DeskRAT malware via spear-phishing. Stay vigilant against evolving potato threats. #PotatoSecurity #APT36 #DeskRAT #Phishing Link: thedailytechfeed.com/apt36-deploy...

0 0 0 0
Post image

APT36 targets Indian government entities with Golang-based DeskRAT malware via spear-phishing. Stay vigilant against evolving cyber threats. #CyberSecurity #APT36 #DeskRAT #Phishing Link: thedailytechfeed.com/apt36-deploy...

0 0 0 0
Post image

Alert: TransparentTribe's new DeskRAT malware targets Indian military's Linux systems. Stay vigilant against phishing attacks. #CyberSecurity #Linux #APT36 #DeskRAT Link: thedailytechfeed.com/transparentt...

0 0 0 0
TransparentTribe Targets Indian Military with DeskRAT

~Sekoia~
TransparentTribe (APT36) is targeting Indian military Linux systems with a new Golang RAT, DeskRAT, delivered via phishing.
-
IOCs: modgovindia[. ]com, 147. 93. 155[. ]118, newforsomething[. ]rest
-
#DeskRAT #ThreatIntel #TransparentTribe

0 0 0 0
Post image

TransparentTribe Targets Linux Systems in Indian Military Networks to Deploy DeskRAT This article should read as a concise cybersecurity news piece summarizing a sophisticated APT campaign by Trans...

#Cyber #Security #News #TransparentTribe #Linux #DeskRAT

Origin | Interest | Match

0 1 0 0
Post image

Discover how #TransparentTribe (#APT36) uses a disguised DESKTOP dropper to deploy #DeskRAT, a Golang RAT, on BOSS Linux endpoints in India.

Our Sekoia #TDR report breaks down the full infection chain and stealthy WebSocket C2 communications .

Read more 👉 blog.sekoia.io/transparentt...

1 1 0 0