Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Pakistan-Linked APT36 Utilizes Linux .desktop Files to Execute Sophisticated Malware Campaign



Pakistan-linked APT36 has recently employed a novel tactic in its malware campaigns by utilizing Linux .desktop files to execute custom malware. This sophisticated operation targets Indian government entities via spear-phishing emails, aiming to steal sensitive data and gain persistent access. With this campaign, the threat actor demonstrates its ability to adapt and innovate, making it essential for organizations to remain vigilant and proactive in defending against such threats.

  • Pakistan-linked APT36 (Transparent Tribe) has used Linux .desktop files in its malware campaigns to target Indian government entities via spear-phishing emails.
  • The group's latest campaign utilizes a malicious archive disguised as a PDF that executes hidden commands via Bash, ensuring persistence and stealth.
  • The malware connects to the C2 using DNS queries and UDP sockets for stealthy communication, enabling data exfiltration and attacker control.
  • Operation Transparent Tribe (APT36) was first spotted in February 2016 targeting Indian diplomats and military personnel in some embassies in Saudi Arabia and Kazakhstan.
  • The group has been active since at least 2013, targeting entities across 27 countries, primarily in Afghanistan, Germany, India, Iran, and Pakistan.
  • APT36's tactics have evolved to include exploiting indigenous technologies, such as Linux .desktop files, to diversify access vectors and ensure persistence.


  • Pakistan-linked APT36, also known as Transparent Tribe (Operation C-Major and Mythic Leopard), has recently employed a novel tactic in its malware campaigns by utilizing Linux .desktop files to execute custom malware. This sophisticated operation targets Indian government entities via spear-phishing emails, aiming to steal sensitive data and gain persistent access.

    The APT group's latest campaign utilizes a malicious archive titled "Meeting_Notice_Ltr_ID1543ops.pdf_.zip" containing a disguised .desktop file flagged on VirusTotal. The shortcut masquerades as a PDF but executes hidden commands via Bash. This .desktop file mimics a PDF but hides malicious commands in its Exec= line, downloading a hex-encoded payload from securestore[.]cv and decoding it silently while displaying a benign PDF in Firefox as a decoy. Disguised with a PDF icon, set to run as an application, and enabled for autostart, the malware ensures persistence and stealth, allowing it to operate unnoticed.

    The analyzed file is a suspicious 64-bit ELF executable for x86-64, statically linked, with anomalies such as a huge section header offset, missing section names, and irregular segments typical of malware packing. It embeds the hardcoded C2 "modgovindia[.]space:4000" and ensures persistence via cron jobs and systemd service abuse. On execution, it connects to the C2 using DNS queries and UDP sockets for stealthy communication, enabling data exfiltration and attacker control.

    The Operation Transparent Tribe (Operation C-Major, APT36, and Mythic Leopard) was first spotted by Proofpoint Researchers in February 2016, during a series of cyber espionage operations against Indian diplomats and military personnel in some embassies in Saudi Arabia and Kazakhstan. Initially tracked to an IP source in Pakistan, the attacks were part of a broader operation that relied on multi-vector tactics such as watering hole websites and phishing email campaigns delivering custom RATs dubbed Crimson and Peppy.

    These RATs are capable of exfiltrating information, capturing screenshots, and recording webcam streams. Transparent Tribe has been active since at least 2013, targeting entities across 27 countries, primarily in Afghanistan, Germany, India, Iran, and Pakistan. The group's broad victimology increases the attack surface, introducing risk to partners, suppliers, and diplomatic missions abroad.

    "While Indian government entities remain the primary focus, APT36 has extended operations to adjacent sectors (education, research, and civil society), as well as opportunistic targeting in other geographies," concludes a report published by CYFIRMA. "The adoption of .desktop payloads targeting Linux BOSS reflects a tactical shift toward exploiting indigenous technologies. Combined with traditional Windows-based malware and mobile implants, this shows the group's intent to diversify access vectors and ensure persistence even in hardened environments."

    This campaign highlights the evolving nature of APT36's tactics and its willingness to adapt and innovate to achieve its objectives. The use of Linux .desktop files represents a novel approach, one that may prove particularly challenging for security professionals to detect and mitigate.

    As the threat landscape continues to evolve, it is essential for organizations to remain vigilant and proactive in defending against sophisticated threats like APT36. This includes implementing robust security measures, such as regular software updates, employee education, and incident response planning, to minimize the impact of such attacks.

    Furthermore, it is crucial for governments and private sector entities to share intelligence and best practices in addressing these types of threats. By doing so, they can enhance their collective defenses against APT36 and other advanced persistent threat actors.

    In conclusion, the recent campaign by Pakistan-linked APT36 highlights the sophistication and adaptability of modern threat actors. As organizations navigate this complex landscape, it is essential to stay informed and take proactive steps to mitigate the risk posed by such threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Pakistan-Linked-APT36-Utilizes-Linux-desktop-Files-to-Execute-Sophisticated-Malware-Campaign-ehn.shtml

  • Published: Mon Aug 25 09:23:10 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us