APT36 Hackers Attacking Indian BOSS Linux Systems

APT36, a notorious hacking group, has been actively targeting Indian BOSS Linux systems, posing significant cybersecurity threats to critical infrastructure. This group employs sophisticated tactics to infiltrate and compromise these systems, aiming to steal sensitive information and disrupt operations. The attack vector primarily involves exploiting vulnerabilities in Linux-based platforms used by Indian government and defense sectors. Organizations using BOSS Linux are urged to enhance their security measures, apply timely patches, and monitor network activities closely to mitigate risks. This article delves into the modus operandi of APT36, the implications of their attacks, and recommended defense strategies to safeguard against such advanced persistent threats. Understanding the threat landscape is crucial for cybersecurity professionals and organizations to build resilient defenses and protect national digital assets.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 26 Aug 2025 13:05:23 +0000


Cyber News related to APT36 Hackers Attacking Indian BOSS Linux Systems

APT36 Hackers Attacking Indian BOSS Linux Systems - APT36, a notorious hacking group, has been actively targeting Indian BOSS Linux systems, posing significant cybersecurity threats to critical infrastructure. This group employs sophisticated tactics to infiltrate and compromise these systems, aiming ...
4 months ago Cybersecuritynews.com APT36
How an Indian startup hacked the world - Reuters previously named Appin in a story about Indian cyber mercenaries published last year. This report paints the clearest picture yet of how Appin operated, detailing the world-spanning extent of its business, and international law enforcement's ...
2 years ago Reuters.com
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
SideCopy Exploiting WinRAR Flaw in Attacks Targeting Indian Government Entities - The Pakistan-linked threat actor known as SideCopy has been observed leveraging the recent WinRAR security vulnerability in its attacks targeting Indian government entities to deliver various remote access trojans such as AllaKore RAT, Ares RAT, and ...
2 years ago Thehackernews.com CVE-2023-38831 APT3 SideCopy Transparent Tribe
APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data - Data collection capabilities include the “github.com/kbinani/screenshot” library for desktop capture and main.sendResponse function for exfiltrating various data types, including files, command outputs, and system information. The ...
6 months ago Cybersecuritynews.com
EFF Helps News Organizations Push Back Against Legal Bullying from Cyber Mercenary Group - For the last several months, there has emerged a campaign of bullying and censorship seeking to wipe out stories about the mercenary hacking campaigns of a less well-known company, Appin Technology, in general, and the company's cofounder, Rajat ...
1 year ago Eff.org
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
1 year ago Cisa.gov
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
1 year ago Cisa.gov
APT36 Hackers Weaponizing PDF Files to Attack Indian Railways, Oil & Government Systems - The Pakistan-linked Advanced Persistent Threat (APT) group APT36, also known as Transparent Tribe, has significantly expanded its cyber operations beyond traditional military targets to encompass critical Indian infrastructure including railway ...
5 months ago Cybersecuritynews.com APT3 Transparent Tribe
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
2 years ago Bleepingcomputer.com
APT36 hackers abuse Linux desktop files to install malware - APT36, a notorious hacker group, has been observed exploiting Linux desktop files to deploy malware, marking a significant evolution in their attack strategies. This group, known for targeting various sectors, leverages the manipulation of Linux ...
4 months ago Bleepingcomputer.com APT36
Hackers now testing ClickFix attacks against Linux targets - A new campaign employing ClickFix attacks has been spotted targeting both Windows and Linux systems using instructions that make infections on either operating system possible. However, it is possible that APT36 is currently experimenting to ...
8 months ago Bleepingcomputer.com Transparent Tribe APT3
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
2 years ago Hackread.com
Pakistani Threat Actors Targeting Indian Government Entities with Sophisticated Cyber Attacks - Recent cybersecurity investigations have revealed that Pakistani threat actors are intensifying their cyber espionage campaigns against Indian government entities. These threat groups employ sophisticated tactics, techniques, and procedures (TTPs) to ...
2 months ago Cybersecuritynews.com Pakistani Threat Actors
CEO arranged his own cybersecurity, with predictable results The Register - On Call It's the last Friday of 2023, but because the need for tech support never goes away neither does On Call, The Register's Friday column in which readers share their tales of being asked to fix the unfeasible, in circumstances that are often ...
2 years ago Go.theregister.com
Pakistan APT Hackers Create Weaponized IndiaPost Website to Attack Windows & Android Users - The attackers employed strategic infrastructure, including IP address 88[.]222[.]245[.]211, which resolves to the suspicious domain email[.]gov[.]in[.]gov-in[.]mywire[.]org, a known tactic of Pakistan-based APT groups attempting to impersonate Indian ...
9 months ago Cybersecuritynews.com APT3 Transparent Tribe
Embedded Linux IoT Security: Defending Against Cyber Threats - Embedded Linux IoT systems are now essential parts of many different kinds of products, from industrial machinery and smart appliances to medical equipment and automobile systems. As Embedded Linux is being used widely, it has attracted the attention ...
2 years ago Securityboulevard.com
The Embedded Systems and The Internet of Things - The Internet of Things is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This concept is gaining its popularity amongst the embedded systems that exist - let's say - 10 or ...
2 years ago Cyberdefensemagazine.com
IT and OT cybersecurity: A holistic approach - In comparison, OT refers to the specialized systems that control physical processes and industrial operations. OT Technologies include industrial control systems, SCADA systems and programmable logic controllers that directly control physical ...
2 years ago Securityintelligence.com
Hackers Weaponizing Pahalgam Attack Themed Decoys to Attack Indian Government Personnel - In a sophisticated cyber espionage campaign, threat actors are actively targeting Indian government personnel using decoy documents referencing the recent Pahalgam attack. The malware campaign appears specifically tailored to compromise sensitive ...
8 months ago Cybersecuritynews.com
Creating a New Market for Post-Quantum Cryptography - A day in the busy life of any systems integrator includes many actions that revolve around the lifeblood of its business - its customers. Systems integrators help solve evolving customer business challenges, which in turn adds partner value. It's a ...
2 years ago Securityboulevard.com
CVE-2020-8023 - A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of ...
5 years ago
Indian IT Leaders Identify Security Gap in Data Policies - A recent study by Rubrik, a US-based data security firm, has bare concerning reality within the Indian IT sector: an alarming 49% of IT leaders feel that security remains a glaring omission within their organization's data policies. This discovery ...
2 years ago Securityboulevard.com
750m Indian mobile subscribers' info for sale on dark web The Register - Asia In Brief Indian infosec firm CloudSEK last week claimed it found records describing 750 million Indian mobile network subscribers on the dark web, with two crime gangs offering the trove of data for just $3,000. CloudSEK named CYBO CREW ...
1 year ago Go.theregister.com
Google Invests $350m In India's Flipkart - Google becomes minority shareholder in Walmart-owned Amazon competitor Flipkart as it progresses investment plans in India. Google is to buy a minority stake worth $350 million in Indian e-commerce company Flipkart, which is majority-owned by ...
1 year ago Silicon.co.uk