Pakistan-Linked APT36 and SideCopy Intensify Cyber Attacks on India’s Critical Infrastructure

In a significant escalation of cyber warfare, Pakistan-affiliated Advanced Persistent Threat (APT) groups, notably APT36 (also known as Transparent Tribe) and its sub-group SideCopy, have launched coordinated attacks targeting India’s critical infrastructure sectors. These sectors include defense, government IT systems, healthcare, telecommunications, and education. The campaign, referred to as Operation Sindoor, commenced on April 17, 2025, and reached its peak between May 7 and May 10, 2025.

Sophisticated Attack Vectors and Social Engineering Tactics

The attackers employed advanced social engineering techniques, utilizing weaponized documents that masqueraded as legitimate communications. These documents exploited recent national tragedies, such as the Pahalgam Terror Attack, to craft compelling lures that bypassed traditional security measures. By leveraging the emotional impact of these events, the threat actors increased the likelihood of recipients opening malicious attachments, thereby facilitating the initial stages of the infection chain.

Evolution of Malware Deployment: From Poseidon to Ares

Security analysts from Seqrite have observed a significant evolution in APT36’s tactical approach. The group has transitioned from using the legacy Poseidon loaders to the more sophisticated Ares malware framework. This modular and evasive system represents a substantial upgrade in the threat landscape, offering enhanced stealth capabilities and remote access functionality. The Ares Remote Access Trojan (RAT) enables comprehensive system compromise, including keylogging, screen capture, file manipulation, and credential theft. It establishes persistent communication channels through callback IP addresses, facilitating prolonged access to compromised systems.

Extensive Digital Infrastructure and Credential Harvesting

The attackers have established an extensive digital infrastructure featuring spoofed domains that mimic trusted Indian entities. Domains such as nationaldefensecollege[.]com and zohidsindia[.]com were designed to exploit user trust and facilitate credential harvesting. By creating these deceptive platforms, the threat actors aimed to collect sensitive information from unsuspecting users, further compromising India’s critical infrastructure.

Advanced Infection Mechanisms and Persistence Techniques

The malware deployment process reveals sophisticated multi-stage execution tactics. Initial access vectors utilized spear-phishing attachments containing malicious file types, including .ppam, .xlam, .lnk, .xlsb, and .msi formats. These files triggered embedded macros that executed web queries to command-and-control infrastructure, specifically targeting domains like fogomyart[.]com/random.php for payload retrieval. The malware leverages Living-off-the-Land Binaries (LOLBins), scheduled tasks for persistence, User Account Control (UAC) bypasses, and obfuscated PowerShell scripts to maintain prolonged access while evading detection systems.

Convergence of Nation-State Espionage and Hacktivist Disruption

This coordinated campaign demonstrates the convergence of nation-state espionage with hacktivist disruption, marking a concerning evolution in cyber warfare tactics targeting democratic institutions and critical infrastructure. The operation generated over 650 confirmed Distributed Denial-of-Service (DDoS) and defacement events, involving 35 hacktivist groups operating under hashtags like #OpIndia and #OperationSindoor. The attackers’ ability to coordinate such a large-scale operation underscores the growing sophistication and collaboration among threat actors targeting India’s critical sectors.

Recommendations for Mitigating the Threat

To mitigate the threat posed by APT36 and SideCopy, organizations within India’s critical infrastructure sectors should implement the following measures:

1. Enhanced Email Security Protocols: Deploy advanced email filtering solutions to detect and block spear-phishing attempts.

2. Regular Security Training: Conduct ongoing cybersecurity awareness programs to educate employees about social engineering tactics and the importance of verifying the authenticity of communications.

3. System Hardening: Implement robust endpoint protection solutions, regularly update software and operating systems, and disable unnecessary services to reduce the attack surface.

4. Network Segmentation: Divide networks into segments to limit lateral movement in case of a breach, thereby containing potential damage.

5. Incident Response Planning: Develop and regularly update incident response plans to ensure swift action in the event of a cyber attack.

6. Threat Intelligence Sharing: Engage in information sharing with industry peers and government agencies to stay informed about emerging threats and attack vectors.

By adopting these proactive measures, organizations can enhance their resilience against sophisticated cyber threats and protect India’s critical infrastructure from future attacks.