Cyber Security

TransparentTribe Hackers Weaponize Websites & Documents to Attack Indian Orgs

The hacker group known as TransparentTribe, also referred to as APT-36, has intensified its cyber espionage activities.

This group, originating from Pakistan, has been actively targeting Indian government organizations, military personnel, and defense contractors with sophisticated cyberattacks aimed at compromising security and gathering sensitive information.

TransparentTribe mostly goes after India and Afghanistan, but it has also been seen going after Australia, Austria, Azerbaijan, Belgium, Botswana, Bulgaria, Canada, China, Czech, Germany, Iran, Japan, Kazakhstan, Kenya, Malaysia, Nepal, the Netherlands, Oman, Pakistan, Romania, Saudi Arabia, Spain, Sweden, Thailand, Turkey, the UAE, the UK, and the USA.

Origin and Targeted Countries (Source: Cyble Vision)

Free Webinar | Mastering WAAP/WAF ROI Analysis | Book Your Spot

Overview of TransparentTribe’s Operations

TransparentTribe is notorious for its well-orchestrated attacks on various platforms, including Windows, Android, and Linux.

The group employs various tactics, such as creating fake websites and documents that mimic legitimate government entities. This deceives targeted users into disclosing their credentials or downloading malware.

TransparentTribe APT Lifecycle

One of the primary methods TransparentTribe uses involves exploiting vulnerabilities within systems to deploy malware and conduct surveillance.

The group has been documented using several critical vulnerabilities outlined below.

CVE-2012-0158

This vulnerability lies in the MSCOMCTL.OCX component of Microsoft systems, allowing remote code execution.

TransparentTribe has crafted malicious files that exploit this vulnerability to execute arbitrary code on the victim’s machine, leading to unauthorized access and control.

CVE-2010-3333

Another significant vulnerability targeted by TransparentTribe is CVE-2010-3333, a stack-based buffer overflow issue in Microsoft Office.

This flaw can be exploited through specially crafted documents, enabling attackers to execute code under the guise of the logged-in user.

Malicious Tools and Techniques

TransparentTribe utilizes a diverse arsenal of tools to infiltrate and persist within the targeted systems.

These include various Remote Access Trojans (RATs), such as Crimson RAT, DarkComet, and ObliqueRAT, which allow remote control of compromised systems.

TransparentTribe Tools (Source: Cyble Vision)

The group’s strategy often involves initial infection through phishing emails, malicious advertisements (malvertising), and social engineering tactics.

Phishing Email Targeting Embassy of India (Source: Proofpoint)
Google advertisement to promote The Kavach app (Source: Zscaler)

The group has been observed using domains with typo-squatted names to mimic official websites, which are then used to host malicious files.

Additionally, TransparentTribe leverages social engineering, notably through platforms like YouTube, where they create fake profiles to lure individuals into downloading malicious applications.

Permissions Asked by Application (Source: SentinelLabs)

The activities of TransparentTribe highlight a significant threat to national security for India and other targeted nations.

The group’s continuous evolution of tactics and sophisticated tools necessitates a robust cybersecurity posture and awareness among potential targets.

Organizations are urged to implement stringent security measures, regular updates, and employee training to mitigate the risks of such advanced persistent threats.

Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP

Dhivya

Divya is a Senior Journalist at Cyber Security news covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records

A public exploit code demonstrating how attackers could exploit CVE-2025-40778, a critical vulnerability in BIND…

50 minutes ago

Thousands of Exchange Servers in Germany Still Running with Out-of-Support Versions

Microsoft Exchange servers in Germany are still running without security updates, just weeks after the…

1 hour ago

Gunra Ransomware Leveraging Attacking Windows and Linux Systems with Two Encryption Methods

The threat landscape continues to evolve as Gunra ransomware emerged in April 2025, establishing itself…

1 hour ago

Google Unveils Guide for Defenders to Monitor Privileged User Accounts

In response to escalating threats of credential theft, Google, through its Mandiant cybersecurity division, has…

1 hour ago

New Atroposia RAT with Stealthy Remote Desktop, Vulnerability Scanner and Persistence Mechanisms

A new remote access trojan called Atroposia has emerged as one of the most concerning…

2 hours ago

Chrome to Alert Users “Always Use Secure Connections” While Opening Public HTTP Sites

Google has announced a significant security initiative that will fundamentally change how Chrome handles unsecured…

2 hours ago