top of page
perceptive_background_267k.jpg

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

Published:

2 January 2026 at 13:52:00

Alert date:

2 January 2026 at 14:02:21

Source:

thehackernews.com

Click to open the original link from this advisory

Ransomware & Malware, Data Breach & Exfiltration, Email & Messaging

Transparent Tribe threat actor has launched new remote access trojan (RAT) attacks targeting Indian governmental, academic, and strategic entities. The campaign uses deceptive delivery techniques including weaponized Windows shortcut (LNK) files masquerading as legitimate PDF documents. The RAT provides persistent control over compromised hosts, allowing the attackers to maintain long-term access to targeted systems.

Technical details

Transparent Tribe APT36 launches attacks using spear-phishing emails with ZIP archives containing weaponized LNK files disguised as PDFs. The LNK file triggers remote HTA script execution via mshta.exe, which decrypts and loads RAT payloads directly into memory while displaying decoy PDF documents. The malware adapts persistence methods based on detected antivirus solutions (Kaspersky, Quick Heal, Avast, AVG, Avira). The RAT includes DLL 'iinneldc.dll' with capabilities for remote system control, file management, data exfiltration, screenshot capture, and clipboard manipulation. Additional campaign uses MSI installer 'nikmights.msi' that deploys executables and DLLs, establishes Registry-based persistence, and communicates with C2 infrastructure using reversed endpoint strings. Patchwork group linked to StreamSpy trojan using WebSocket and HTTP protocols for C2 communication.

Mitigation steps:

Monitor for suspicious LNK files disguised as PDF documents, track mshta.exe execution with remote HTA scripts, implement behavioral detection for memory-loaded payloads, monitor Registry modifications for persistence mechanisms, watch for communication to identified C2 infrastructure, scan for specific file hashes and file paths mentioned in IOCs, implement endpoint detection for the specific DLL names and executable files, monitor WebSocket and HTTP traffic patterns indicative of StreamSpy trojan communication, establish monitoring for reversed endpoint strings in network traffic.

Affected products:

Windows systems
mshta.exe
cmd.exe
WScript.Shell
MSBuild
Windows Registry
Windows Startup folder
Kaspersky antivirus
Quick Heal antivirus
Avast antivirus
AVG antivirus
Avira antivirus

Related links:

https://www.cyfirma.com/research/apt36-multi-stage-lnk-malware-campaign-targeting-indian-government-entities/
https://thehackernews.com/2023/09/transparent-tribe-uses-fake-youtube.html
https://thehackernews.com/2023/04/pakistan-based-transparent-tribe.html
https://thehackernews.com/2024/11/icepeony-and-transparent-tribe-target.html
https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
https://web.archive.org/web/20240808195321/https://pkcert.gov.pk/advisory/24-12.pdf
https://www.cyfirma.com/research/apt36-lnk-based-malware-campaign-leveraging-msi-payload-delivery/
https://thehackernews.com/2025/07/patchwork-targets-turkish-defense-firms.html
https://ti.qianxin.com/apt/detail/5aa10b90d70a3f2810c4d3c5?name=Hangover&type=list
https://www.linkedin.com/posts/idan-tarab-7a9057200_india-backdoor-msbuild-activity-7397661496421470208-ltCf/
https://www.huntress.com/blog/detecting-malicious-use-of-lolbins
https://ti.qianxin.com/blog/articles/analysis-of-streamspy-a-new-trojan-using-websocket-by-patchwork-en/
https://ti.qianxin.com/blog/articles/Patchwork-Group-Utilizing-WarHawk-Backdoor-Variant-Spyder-for-Espionage-against-Multiple-Countries-EN/
https://thehackernews.com/2024/09/cloudflare-warns-of-india-linked.html
https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
https://www.virustotal.com/gui/file/3a4f47c60edf1e00adb3ca60a7643062657fe2c6dd85ace9dfd8fdec47078d4e
https://www.virustotal.com/gui/file/dc297aded70b0692ad0a24509e7bbec210bc0a1c7a105e99e1a8f76e3861ad34
https://x.com/malwrhunterteam/status/1985321347279626438
https://x.com/malwrhunterteam/status/1986334542123159792
https://thehackernews.com/2025/07/donot-apt-expands-operations-targets.html
https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA==&mid=2247507603&idx=1&sn=af41be456f6393a24771846328e8d7f2&poc_token=HFXIV2mjHDf6vRChlY5yx20OepiqSApAHaYOo067
https://ti.qianxin.com/blog/articles/analysis-of-the-attack-activity-of-the-apt-q-38-using-pdf-document-decoys-cn/

Related CVE's:

Related threat actors:

IOC's:

NCERT-Whatsapp-Advisory.pdf.lnk, nikmights.msi, aeroclubofindia.co[.]in, C:\ProgramData\PcDirvs\pdf.dll, C:\ProgramData\PcDirvs\wininet.dll, PcDirvs.exe, PcDirvs.hta, dns.wmiprovider[.]com, iinneldc.dll, C:\Users\Public\core\, /retsiger, /taebtraeh, /dnammoc_teg, /dnammocmvitna, firebasescloudemail[.]com, OPS-VII-SIR.zip, Annexure.exe, 3a4f47c60edf1e00adb3ca60a7643062657fe2c6dd85ace9dfd8fdec47078d4e

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page