Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Home/Threats/Transparent Tribe Attacks India’s Startup Ecosystem in New Campaign
Threats

Transparent Tribe Attacks India’s Startup Ecosystem in New Campaign

Transparent Tribe, a persistent advanced threat group, has initiated a new cyber campaign directly targeting India’s burgeoning startup ecosystem. This marks an unexpected escalation in the...

Emy Elsamnoudy
Emy Elsamnoudy
February 6, 2026 3 Min Read
5 0

Transparent Tribe, a persistent advanced threat group, has initiated a new cyber campaign directly targeting India’s burgeoning startup ecosystem. This marks an unexpected escalation in the threat landscape facing the nation’s technology sector.

A Pakistan-based hacking group called Transparent Tribe has shifted its focus from traditional government targets to the country’s vibrant startup ecosystem, particularly companies working in cybersecurity and intelligence domains.

The group, also tracked as APT36, has been active since 2013 and now uses dangerous malware called Crimson RAT to infiltrate Indian startups through carefully crafted fake emails containing malicious files disguised as legitimate documents.

The attack campaign was discovered after researchers found suspicious files uploaded from India containing startup-themed material.

Unlike previous operations that targeted defense organizations and educational institutions, this campaign specifically focuses on individuals connected to startups offering security services to law enforcement agencies.

The hackers used personal information about a real startup founder to create convincing fake documents that appear legitimate to unsuspecting victims.

After analyzing the threat, Acronis researchers identified that the group delivers its malware through ISO container files sent via email.

When someone opens what appears to be an Excel spreadsheet, they unknowingly activate a chain of hidden commands that install Crimson RAT on their computer.

Attack chain demonstration of the payload execution (Source - Acronis)
Attack chain demonstration of the payload execution (Source – Acronis)

This remote access trojan allows hackers to monitor screens, record audio, steal files, and control infected systems without the victim’s knowledge.

Attack Execution and Stealth Mechanisms

The infection process begins when victims receive an email containing a file called MeetBisht.iso.

Inside this container sits a shortcut file masquerading as an Excel document alongside a hidden folder containing three components: a decoy document to distract the victim, a batch script that handles execution, and the actual Crimson RAT payload disguised as an excel executable.

Once activated, the malicious shortcut launches a batch script that simultaneously displays a fake Excel file while secretly copying the malware to the computer’s system folders.

Contents inside the malicious container-based payload (Source - Acronis)
Contents inside the malicious container-based payload (Source – Acronis)

The script uses PowerShell commands to remove security warnings that would normally alert users about suspicious files.

It then creates a hard-linked executable with a random name in the user’s application data folder and launches the malware from this trusted location.

Hardcoded C&C servers (Source - Acronis)
Hardcoded C&C servers (Source – Acronis)

The Crimson RAT payload employs sophisticated evasion tactics. The malware file appears artificially inflated to 34 megabytes through embedded junk data, though the actual malicious code measures only 80 to 150 kilobytes.

This bloating technique helps bypass signature-based detection systems. The malware uses completely randomized function names throughout its code, making analysis extremely difficult.

Decoys' images (Source - Acronis)
Decoys’ images (Source – Acronis)

It communicates with command-and-control servers using custom TCP protocols on non-standard ports including 18661, 20856, 26868, 29261, and 36628.

Organizations should implement email filtering to block ISO and container-based attachments from unknown sources.

Regular security awareness training helps employees recognize social engineering tactics. Deploying endpoint detection solutions can identify suspicious PowerShell activity and unauthorized file modifications.

Network monitoring should flag unusual outbound connections to non-standard ports used by Crimson RAT.

Maintaining updated threat intelligence feeds ensures protection against known command-and-control servers associated with Transparent Tribe campaigns.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityHackerMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

FvncBot Exploits Android Accessibility Services to Attack

Next Post

Bulletproof Hosting Leverages ISPsystem Servers for Cyber

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us