CYFIRMA has identified an ongoing cyber-espionage campaign orchestrated by APT36 (Transparent Tribe), a Pakistan-based threat actor with a sustained focus on Indian Government entities. This operation reflects the group’s increasing sophistication and flexibility; leveraging tailored malware, aimed at Boss operating systems.
Initial access is achieved through spear phishing emails. Linux BOSS environments are targeted via weaponized .desktop shortcut files that, once opened, download and execute malicious payloads.
APT36’s capability to customize its delivery mechanisms according to the victim’s operating environment thereby increases its chances of success while maintaining persistent access to critical government infrastructure and evading traditional security controls.
Nation-state threat actors continue to evolve their tactics to exploit vulnerabilities across diverse operating environments, posing a significant challenge to government defenses. APT36 (also known as Transparent Tribe), a Pakistan-based adversarial group, remains actively engaged in cyber espionage operations against Indian Government institutions. Recent CYFIRMA observations reveal a marked increase in the group’s sophistication, as it deploys customized malware tailored specifically for the Linux BOSS operating system. By adopting a dual-platform delivery strategy, APT36 seeks to maximize its reach and ensure sustained, covert access to critical government infrastructure while circumventing conventional security mechanisms.
Target Technologies | Windows and BOSS Operating System |
Threat Type | Phishing Campaign |
Written In | GO Language |
File Types | ELF (Executable and Linkable format) |
Key Malware Identifiers | Meeting_Ltr_ID1543ops.pdf.desktop and Meeting_Ltr_ID1543ops.pdf-.elf |
Observed First | 2025-08-01 |
Impact | Data Exfiltration |
MD5 Hashes | Meeting_Ltr_ID1543ops.pdf.desktop “10b7139952e3daae8f9d7ee407696ccf” Meeting_Ltr_ID1543ops.pdf-.elf “5bfeeae3cc9386513dc7c301c61e67a7” |
In this campaign, the group distributes an Archive file named “Meeting_Notice_Ltr_ID1543ops.pdf_.zip”.
When opened, it contains a .desktop file named “Meeting_Ltr_ID1543ops.pdf.desktop” (Linux shortcut file).
The .desktop file has been flagged as highly malicious on VirusTotal, with multiple antivirus engines consistently identifying it as associated with malware or unauthorized execution behavior.
The “.desktop” file shown is crafted to masquerade as an ordinary PDF shortcut but contains a chain of commands embedded in its Exec= line that are executed automatically and sequentially as soon as the file is launched. This enables the attacker to perform covert actions while keeping the victim unaware.
The Exec field launches a Bash shell using bash -c, allowing several commands to be chained in a single line. The sequence begins by generating a temporary filename inside /tmp, incorporating a timestamp to avoid detection and prevent naming conflicts. Using curl -s, the script silently retrieves a hex-encoded file (Mt_dated_29.txt) from an attacker-controlled server.
Instead of saving it directly, the download is piped through xxd -r -p, which converts the hexadecimal text into raw binary form. This binary is written directly to the temporary file path.
If this download and conversion succeed, the script uses chmod +x to make the temporary file executable and immediately runs it in the background. At this stage, the malicious payload (whose content is unknown to the user) is now active in the system.
To divert suspicion, the script then launches Firefox in the background and opens a Google Drive link containing a harmless PDF. This acts as a visual decoy, leading the victim to believe that they have simply viewed a document, all while the malicious binary continues its execution unseen.
Type=Application tells the system to treat the entry as an executable program rather than a document, ensuring that its payload is run rather than simply opened.
Terminal=false prevents any terminal window from appearing on-screen, letting all actions execute silently.
Icon=application-pdf assigns a familiar PDF icon to the shortcut, enhancing its disguise as a legitimate document. Together, these attributes support a classic social-engineering rule.
Enabling X-GNOME-Autostart-enabled=true ensures that the file automatically runs every time the user logs in, granting the attacker persistence on the system. Combined with stealthy execution and a convincing disguise, this multistage mechanism allows the attacker to deliver and run malware, maintain access, and potentially perform further malicious operations without triggering immediate detection by the user.
Domain Analysis
Domain “securestore[.]cv” has been identified as a part of the malicious infrastructure actively leveraged in cyber espionage campaigns attributed to the APT36 (Transparent Tribe) threat group, which is assessed to be operating out of Pakistan.
The domain securestore[.]cv has been observed communicating with the file Meeting_Ltr_ID1543ops.pdf.desktop.
The domain securestore[.]cv, registered via Namecheap on 27 July 2025 and currently only 23 days old, warrants scrutiny as potential malicious infrastructure, due to its recent creation and associated registrar attributes.
These campaigns resemble previously observed Linux-based attack patterns, in which .desktop files are weaponized to mimic legitimate government or defense-related documents. Upon execution, the files establish connections with newly registered domains linked to APT36 infrastructure, such as “securestore[.]cv” to download and execute additional malicious payloads.
ELF Header: Starts with the magic bytes 7F 45 4C 46 (representing “.ELF” in ASCII), indicating it is an Executable and Linkable Format file.
The file was identified as an ELF 64-bit LSB executable for x86-64 (version 1, SYSV), statically linked. It exhibits an unusually large section header offset of 9,626,443, which may indicate corruption or malicious tampering.
This ELF executable file has an entry point at 0x477c00. It includes 6 program headers (56 bytes each) starting at byte 64, and 25 section headers (64 bytes each) starting at byte 400. The section name table is at index 22. The ELF header is 64 bytes, with no special flags set.
Three LOAD segments include readable-executable code, read-only data, and a read-write segment with a larger memory than file size, suggesting unpacked or runtime data typical in malware. The GNU_STACK segment’s read-write permission also poses potential security concerns.
The section headers are suspicious due to missing section names, which are uncommon in normal binaries and often used to hide malicious code. Several sections have unusual flags, zero addresses, or irregular sizes and alignments. Large NOBITS sections with no file offset may be used to load hidden data at runtime, indicating possible obfuscation or packing typical of malware.
The presence of “http://modgovindia[.]space:4000” as both a string and a hex value in the malware file indicates a hardcoded command-and-control (C2) server address, embedded to ensure persistent communication for receiving commands, delivering payloads, or exfiltrating data.
Upon execution, the malware enables the system-update.service for the current user, ensuring it is automatically started during future user-level systemd sessions.
The malware establishes persistence by quietly inserting a cron job that executes the hidden payload ‘.config/systemd/systemd-update’ on every system reboot. This ensures the malicious code automatically restarts after system reboots or process termination.
Subsequently, the malware established command-and-control (C2) communication with the domain “modgovindia[.]space”, which resolves to the IP address 45[.]141[.]58[.]199, over port 4000.
The observed activity involves low-level socket operations used by malware to perform DNS queries for command-and-control (C2) communication. It creates a non-blocking UDP socket, enables broadcast, and connects to the local DNS resolver at 127.0.0.53:53. Using epoll for efficient event handling, the malware sends DNS queries, such as for the suspicious domain modgovindia[.]space, and attempts to read responses non-blockingly. Futex system calls indicate synchronization in a multithreaded context. This behavior points to DNS-based reconnaissance or communication with a malicious server as part of a C2 infrastructure.
The malware attempts to transmit harvested data to the attacker’s infrastructure, indicating the presence of an active bidirectional command-and-control (C2) channel that facilitates both the retrieval of instructions and the exfiltration of information.
Domain Analysis
The domain “modgovindia[.]space” has been flagged as malicious by multiple detection engines and is assessed to be associated with APT36 activity.
The domain modgovindia[.]space, registered on 8 July 2025 via Namecheap and hosted on IP 45[.]141[.]58[.]199 by Seychelles-based IP Connect Inc., is assessed as likely malicious due to its recent registration and infrastructure commonly used in malware or phishing campaigns.
APT36, also known as Transparent Tribe or Mythic Leopard, is a Pakistan-linked cyber-espionage group that has been active for over a decade, with campaigns becoming increasingly sophisticated since 2016. The group is widely assessed to operate with state sponsorship, focusing primarily on Indian government, military, and diplomatic institutions, while also expanding into education, defense contractors, and critical infrastructure sectors. Their operations typically rely on spear-phishing emails, malicious documents, spoofed login portals, and custom malware implants to gain and maintain access. APT36’s persistent targeting reflects its strategic objective of collecting sensitive information to support Pakistan’s military and diplomatic priorities.
While Indian government entities remain the primary focus, APT36 has extended operations to adjacent sectors (education, research, and civil society), as well as opportunistic targeting in other geographies. This broad victimology increases the attack surface and introduces risk to partners, suppliers, and diplomatic missions abroad.
The adoption of .desktop payloads targeting Linux BOSS reflects a tactical shift toward exploiting indigenous technologies. Combined with traditional Windows-based malware and mobile implants, this shows the group’s intent to diversify access vectors and ensure persistence even in hardened environments.
MITRE MAPPING | ||
Tactic | ID | Technique Name |
Execution | T1064 | Scripting |
T1053 | Scheduled Task/Job | |
Defense Evasion | T1064 | Scripting |
T1222 | File and Directory Permissions Modification | |
T1014 | Rootkit | |
T1564.001 | Hide Artifacts: Hidden Files and Directories | |
Persistence | T1053 | Scheduled Task/Job |
T1037 | Boot or Logon Initialization Scripts | |
T1546.004 | Event Triggered Execution: Unix Shell Configuration Modification | |
T1543.002 | Create or Modify System Process: Systemd Service | |
Privilege Escalation | T1053 | Scheduled Task/Job |
T1546.004 | Event Triggered Execution: Unix Shell Configuration Modification | |
T1037 | Boot or Logon Initialization Scripts | |
T1543.002 | Create or Modify System Process: Systemd Service | |
Credential Access | T1003.001 | OS Credential Dumping: LSASS Memory |
Discovery | T1082 | System Information Discovery |
T1083 | File and Directory Discovery | |
Collection | T1005 | Data from Local System |
T1025 | Data from Removable Media | |
Command and Control | T1571 | Non-Standard Port |
T1001.001 | Data Obfuscation: Junk Data | |
T1105 | Ingress Tool Transfer | |
T1095 | Non-Application Layer Protocol | |
T1071 | Application Layer Protocol | |
T1090 | Proxy | |
Exfiltration | T1048 | Exfiltration Over Alternative Protocol |
T1011.001 | Exfiltration Over Other Network Medium: Exfiltration Over Bluetooth | |
Impact | T1498 | Network Denial of Service |
The analysis indicates a coordinated cyber-espionage campaign attributed to APT36, leveraging weaponized .desktop files to target BOSS Linux environments within Indian Government entities. These files are designed to masquerade as legitimate documents while covertly communicating with recently registered malicious domains such as “securestore[.]cv” and “modgovindia[.]space” to download and execute secondary payloads. Both domains exhibit characteristics typical of disposable threat infrastructure and have been flagged as malicious by multiple threat-intelligence sources. The group’s ability to rapidly deploy tailored payloads and infrastructure demonstrates increasing sophistication and underscores the need for heightened vigilance, particularly around spear-phishing vectors and Linux-based attack surfaces.
Recommendations and Mitigation Strategies
To mitigate the ongoing APT36 campaign targeting Indian Government entities through weaponized .desktop files and associated malicious domains, the following measures are formally recommended:
1. Email Security Enhancements
2. User Awareness and Training
3. Host and Operating System Hardening
4. Endpoint and Network Monitoring
5. Threat Intelligence Integration
6. Patch and Vulnerability Management
7. Behavior-Based Controls
Maintaining ongoing situational awareness through CYFIRMA’s threat intelligence services, coupled with regular updates of IOCs and a defense-in-depth approach, will significantly enhance the ability to detect, prevent, and respond to APT36’s increasingly sophisticated intrusion activity.
Kindly refer to the IOCs section, applying relevant security controls.
S. No | Indicator | Remarks |
1 | 508a2bcaa4c511f7db2d4491bb76effaa7231d66110c28632b95c77be40ea6b1 | Block |
2 | 8f8da8861c368e74b9b5c1c59e64ef00690c5eff4a95e1b4fcf386973895bef1 | Block |
3 | e689afee5f7bdbd1613bd9a3915ef2a185a05c72aaae4df3dee988fa7109cb0b | Block |
4 | securestore[.]cv | Block |
5 | modgovindia[.]space | Block |
6 | 45[.]141[.]58[.]199 | Monitor |
rule APT36_LinuxDesktop_Campaign
{
meta:
description = “Detects artifacts related to APT36 .desktop file campaign”
author = “CYFIRMA Research”
date = “2025-08-18”
version = “1.0”
strings:
// Malware file hashes (sha256)
$hash1 = “508a2bcaa4c511f7db2d4491bb76effaa7231d66110c28632b95c77be40ea6b1”
$hash2 = “8f8da8861c368e74b9b5c1c59e64ef00690c5eff4a95e1b4fcf386973895bef1”
$hash3 = “e689afee5f7bdbd1613bd9a3915ef2a185a05c72aaae4df3dee988fa7109cb0b”
// Malicious domains and IP
$domain1 = “securestore.cv”
$domain2 = “modgovindia.space”
$ip1 = “45.141.58.199”
// Suspicious command patterns used in payload
$cmd1 = /curl.*xxd.*chmod/s nocase
$cmd2 = /\.desktop/ nocase
condition:
any of ($hash*) or
any of ($domain*,$ip*) or
2 of ($cmd*)
}