Transparent Tribe—also known as APT36 and believed to be based in Pakistan—has ramped up cyberespionage by targeting both Windows and BOSS (a Linux-based OS used by Indian agencies) environments using weaponized .desktop shortcut files disguised as PDF documents. These files, embedded in spear-phishing emails with fake meeting notices, trigger a shell script when opened: the script retrieves a hex-encoded payload from a malicious server, saves it as an ELF binary, and launches a fake PDF via Firefox. Meanwhile, the Go-based malware reaches out to a hard-coded command-and-control server to receive instructions and exfiltrate data. This evolving tactic underscores the group’s adaptability and continued threat to Indian governmental infrastructure.
Sources: Hacker News, Security Week, Hunt.io
Key Takeaways
– Cross-Platform Sophistication: APT36 is now employing dual-platform attacks, targeting both Windows and Linux (including BOSS), showing technical flexibility and deeper understanding of Indian government OS environments.
– Weaponized .desktop Files as Lures: The group’s new use of .desktop files—a native Linux shortcut format—masquerading as PDFs highlights a novel social-engineering angle tailored to native system behavior.
– Persistent and Resilient Infrastructure: Their malware drops, executed invisibly, establish persistence and connect to hardened C2 infrastructure like Go-based payloads and Poseidon backdoors, indicating long-term espionage intent.
In-Depth
Transparent Tribe—also tagged as APT36—is stepping up its cyber-espionage game by deploying cunning, dual-platform tactics that threaten both Windows systems and the homegrown BOSS Linux environments used in Indian government networks. The latest campaign hinges on seemingly harmless .desktop files disguised as PDF meeting notices, which are delivered through spear-phishing emails. Once clicked, these shortcut files activate a shell script that fetches a hex-encoded ELF payload, silently installs it, and opens a decoy PDF to distract users. The Go-based malware then reaches out to a hard-coded command-and-control server—modgovindia[.]space:4000—ensuring continued access and data exfiltration.
This approach demonstrates clear sophistication. APT36 adapts rapidly, combining social engineering with technical evasion to breach hardened Linux targets—something traditional enterprise defenses may overlook. Their infrastructure supports long-term persistence, letting them harvest credentials or sensitive information under the radar. And with their history of targeting defense, aerospace, and other critical sectors, this new campaign signals a concerning escalation.
Mitigation efforts must evolve: educating users about deceptive file types, enforcing strict email filtering, monitoring abnormal behavior post-click, and isolating Linux environments from risky email vectors are critical. If unchecked, this threat could compromise national systems with broad implications.

