Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Actively Exploiting Critical NGIN NGINX Vulnerability
May 18, 2026
Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
May 18, 2026
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Home/Threats/APT36 Attacks Linux Systems with New Tools to Disrupt
Threats

APT36 Attacks Linux Systems with New Tools to Disrupt

For more than a decade, Indian government and defense organizations have faced persistent cyber threats. A tightly connected espionage ecosystem, primarily involving the Transparent Tribe (APT36)...

David kimber
David kimber
February 10, 2026 2 Min Read
6 0

For more than a decade, Indian government and defense organizations have faced persistent cyber threats.

A tightly connected espionage ecosystem, primarily involving the Transparent Tribe (APT36) group and the aligned SideCopy cluster, has continued to probe and adapt.

These actors rely on proven tactics like spear-phishing and weaponized documents to quietly embed themselves in target environments.

Their goal remains unchanged: long-term intelligence collection through stealthy, resilient access.

Recent observations reveal multiple active campaigns targeting these sectors across both Windows and Linux environments.

One campaign targeted Windows systems using phishing emails that delivered malicious files, ultimately deploying Geta RAT.

The infection chain abuses legitimate Windows components—including mshta.exe and XAML deserialization—to evade traditional file-based detection mechanisms.

VP of Security Engineering and AI Strategy at Aryaka, Aditya K Sood noted that critical infrastructure is under threat from highly organized, state-sponsored “espionage ecosystems” deploying tools aimed at disrupting essential services and gathering intelligence.

The attackers have steadily evolved their tooling to include cross-platform payloads and memory-resident execution.

This design prioritizes patience over speed, allowing them to maintain a durable foothold.

The operations are not isolated incidents but coordinated efforts within a mature threat landscape, reinforcing the need for sustained defense efforts against these “espionage ecosystems.”

Linux Campaign and System Persistence

In a significant shift, a separate campaign focused on Linux environments, an area where Transparent Tribe has shown growing maturity.

This operation utilized a Go-based downloader to install Ares RAT, a Python-based remote access tool historically associated with the group. Once deployed, the malware performed automated system profiling and structured data exfiltration.

To achieve persistence, the attackers used systemd user services. This technique allows the malware to survive reboots while blending into normal system operations.

This reliable access mechanism ensures they can continue their reconnaissance missions uninterrupted.

This campaign signals a clear intent to maintain parity across platforms rather than treating Linux as an afterthought.

Additionally, an emerging tool named Desk RAT, distributed via malicious PowerPoint Add-Ins, highlights the group’s ongoing innovation in surveillance.

Detecting these actors requires visibility across platforms and attention to subtle behavioral signals. Defenders must understand that persistence is the attacker’s greatest weapon.

Security teams must monitor for unusual service creations and network anomalies. Taking these steps empowers organizations to disrupt the espionage lifecycle before sensitive data is lost.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Windows Error Reporting Flaw: Attackers Elev Service Vulnerability

Next Post

Threat Actors Use Bing Ads for Azure Tech Support Scams

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us