Published on April 16, 2025. EST READ TIME: 2 minutes
A Pakistan-affiliated hacking group has escalated its cyber operations against Indian entities, introducing advanced malware tools such as CurlBack RAT and Spark RAT. These attacks, identified by SEQRITE in December 2024, have targeted India’s railway, oil and gas, and external affairs ministries, indicating a broader focus beyond previous targets like defense and maritime sectors.
The group has transitioned from using HTML Application (HTA) files to Microsoft Installer (MSI) packages for malware deployment, enhancing their ability to bypass security measures. Phishing emails containing deceptive documents—such as holiday lists for railway staff or cybersecurity guidelines from Hindustan Petroleum Corporation Limited (HPCL), serve as lures. Once executed, CurlBack RAT can collect system information, download files, execute arbitrary commands, elevate privileges, and list user accounts. Spark RAT, being cross-platform, poses threats to both Windows and Linux systems. Security experts attribute these activities to the SideCopy subgroup within the Transparent Tribe (APT36) threat actor, known for its focus on Windows systems and evolving malware arsenal.
North Korea's Lazarus Group Rakes in $3 Million: Unveiling Cybercrime's Financial Motivations
Read More 2 min read
Security Vulnerability: Windows Hello Fingerprint Authentication Bypassed on Popular Laptops
Read More 2 min read
Indian Startup Hack-for-Hire: Navigating the Complexities of Ethical Hacking
Read More 2 min read
North Korean Hackers Pose as Job Recruiters in Cyber Espionage Campaign
Read More 2 min read
Analysis Reveals: Bad Bots Constitute a Staggering 73% of Internet Traffic
Read More 2 min read
Menu