APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux

May 6, 2025, 8:11 p.m.

Description

A recent campaign attributed to APT36 has been observed spoofing India's Ministry of Defence to deliver cross-platform malware. The attackers used a ClickFix-style infection chain, mimicking government press releases and leveraging a compromised .in domain for payload staging. The campaign targeted both Windows and Linux users, employing clipboard-based execution techniques. On Windows, the attack utilized mshta.exe to execute a heavily obfuscated HTA file, while on Linux, it attempted to execute a shell script. The tradecraft observed, including government-themed lures, HTA-based delivery, and decoy documents, aligns with known APT36 tactics. This activity demonstrates the continued evolution of ClickFix techniques in new contexts.

Date

  • Created: May 6, 2025, 7:41 p.m.
  • Published: May 6, 2025, 7:41 p.m.
  • Modified: May 6, 2025, 8:11 p.m.

Indicators

  • 7087e5f768acaad83550e6b1b9696477089d2797e8f6e3f9a9d69c77177d030e
  • 185.117.90.212
  • email.gov.in.avtzyu.store
  • trade4wealth.in
  • drdosurvey.info
  • avtzyu.store
  • email.gov.in.drdosurvey.info

Attack Patterns

Additional Informations

  • Defense
  • Government
  • India