APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux
May 6, 2025, 8:11 p.m.
Description
A recent campaign attributed to APT36 has been observed spoofing India's Ministry of Defence to deliver cross-platform malware. The attackers used a ClickFix-style infection chain, mimicking government press releases and leveraging a compromised .in domain for payload staging. The campaign targeted both Windows and Linux users, employing clipboard-based execution techniques. On Windows, the attack utilized mshta.exe to execute a heavily obfuscated HTA file, while on Linux, it attempted to execute a shell script. The tradecraft observed, including government-themed lures, HTA-based delivery, and decoy documents, aligns with known APT36 tactics. This activity demonstrates the continued evolution of ClickFix techniques in new contexts.
Tags
Date
- Created: May 6, 2025, 7:41 p.m.
- Published: May 6, 2025, 7:41 p.m.
- Modified: May 6, 2025, 8:11 p.m.
Indicators
- 7087e5f768acaad83550e6b1b9696477089d2797e8f6e3f9a9d69c77177d030e
- 185.117.90.212
- email.gov.in.avtzyu.store
- trade4wealth.in
- drdosurvey.info
- avtzyu.store
- email.gov.in.drdosurvey.info
Additional Informations
- Defense
- Government
- India