APT36 Targets Indian Government: Credential Theft Campaign Uncovered
Activity Timeline
Key Insights
Threat Overview
In early August 2025, a sophisticated phishing campaign attributed to the Pakistan-linked APT36 group has emerged, posing a serious threat to Indian government infrastructure. The operation specifically targets defense organizations and government entities, employing advanced techniques to steal login credentials. Security analysts have reported that the campaign leverages typo-squatted domains that closely mimic legitimate Indian government portals, such as mail.mgovcloud.in and virtualeoffice.cloud. According to a cybersecurity expert, the use of such deceptive domains 'significantly increases the likelihood of user engagement and credential theft.' Upon accessing these malicious URLs, victims are redirected to counterfeit pages designed to replicate official government layouts, prompting them to input their email IDs, passwords, and one-time passwords (OTPs) generated by the Kavach multi-factor authentication system. This tactic aims to bypass MFA protections, enabling unauthorized access to sensitive accounts and potentially exposing classified data, which poses an escalating risk to national security infrastructure.
The campaign was first detected on August 1, 2025, and has since demonstrated technical sophistication, with the phishing infrastructure utilizing domains resolving to specific IP addresses, including 99.83.175.80, hosted on Amazon's AS16509, and 37.221.64.202. These findings indicate that APT36 is employing robust resources to conduct its operations. 'The ongoing threat from APT36 signifies a pivotal moment for cybersecurity in India,' stated a senior cybersecurity analyst, emphasizing the need for immediate action from governmental bodies.
This type of phishing attack is not unprecedented. Similar tactics have been observed in previous campaigns targeting various sectors, raising concerns about the vulnerability of government systems. Experts have noted that the incorporation of trusted cybersecurity reporting email addresses in the phishing emails bolsters credibility, making it more challenging for users to discern the legitimacy of the communications. 'The combination of social engineering and technical sophistication makes this campaign particularly alarming,' noted another cybersecurity expert.
In response, cybersecurity teams within affected government organizations are advised to enhance their security protocols and conduct training sessions to raise awareness among employees. The cybersecurity community has emphasized the importance of multi-layered defenses, including robust email filtering systems and user education on recognizing phishing attempts. 'Government entities must adopt a proactive security posture to mitigate the risks associated with such advanced phishing campaigns,' concluded the analyst.
As the situation continues to develop, organizations are encouraged to monitor for suspicious activity and implement necessary security measures to protect sensitive data from falling into the hands of malicious actors.
Tactics, Techniques & Procedures (TTPs)
Timeline of Events
Source Citations
Related Articles
2 articlesAPT36 Hackers Attacking Indian Government Entities to Steal Login Credentials
A sophisticated phishing campaign attributed to the Pakistan-linked APT36 group has emerged as a serious threat to Indian government infrastructure. First detected in early August 2025, this operation leverages typo-squatted domains designed to mimic official government login portals. When unsuspecting users enter their email IDs and passwords, they are redirected to counterfeit pages that replicate […]
Save to Folder
Choose a folder to save this cluster: