Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
Pakistan-Linked Threat Actor Targets Indian Linux Operation System

Pakistan-linked hackers are targeting an Indian Linux-based operating system by tricking government employees into clicking malicious files that look like PDFs. When opened, the files install spyware, giving attackers long-term access to sensitive government systems.
See Also: OnDemand | North Korea’s Secret IT Army and How to Combat It
The threat actor deploying malicious files on the Bharat Operating Systems Solution, a Debian Linux variant promoted by the Indian government. The malicious file downloads and executes ELF binaries while displaying decoy documents, marking an evolution in the group’s tactics to infiltrate government networks and expand its cyberespionage operations, found cybersecurity firm Cyfirma.
Known as Transparent Tribe, APT36 and Earth Karkaddan, the group has operated since at least 2013. It specializes in cyberespionage aimed at collecting sensitive information in support of Pakistani military and diplomatic interests. Security firm BlackBerry in 2024 spotted the threat actor conducting a series of campaigns against government agencies, and the defense sector (see: Pakistani-Aligned APT36 Targets Indian Defense Organizations ).
The attack begins with spear-phishing emails that contain zip archives. The files include a weaponized .desktop
shortcut tailored for the BOSS operating system. When opened, the .desktop
file executes a chain of commands. It downloads an ELF binary to a temporary directory, makes it executable and immediately runs it, while simultaneously opening a decoy document mostly through Firefox, obscuring the malicious activity.
On Linux systems, .desktop
files are usually harmless shortcut files that help users quickly launch applications or documents, similar to desktop icons in Windows. They can also be configured to automatically start certain programs when a user logs in.