Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Indian Government Phishing Campaign

December 26, 2023
Reading Time: 2 mins read
in Alerts
Indian Government Phishing Campaign

Indian government entities and the defense sector are under threat from a phishing campaign, known as Operation RusticWeb, which employs Rust-based malware for intelligence gathering. SEQRITE, an enterprise security firm, detected this activity in October 2023. The campaign involves the deployment of new Rust-based payloads and encrypted PowerShell commands to exfiltrate confidential documents. Notably, the malware uses a web-based service engine for data exfiltration instead of a dedicated command-and-control server.

The phishing campaign, named Operation RusticWeb, poses a significant risk to Indian government bodies and the defense sector. SEQRITE has identified tactical similarities between the threat actor behind this campaign and those associated with Transparent Tribe and SideCopy, both believed to have links to Pakistan. The attackers use various infection chains, including phishing emails with malicious PDF files that drop Rust-based payloads. These payloads are designed to enumerate the file system and collect system information, transmitting the data to a command-and-control server.

The malware employed in Operation RusticWeb lacks some of the advanced features found in other stealer malware, focusing primarily on file system enumeration and data exfiltration. A second infection chain, discovered in December, follows a similar multi-stage process but replaces the Rust malware with a PowerShell script. Notably, the final-stage payload is executed through a Rust executable named “Cisco AnyConnect Web Helper.” The collected information is uploaded to an anonymous public file-sharing engine.

The campaign’s potential connection to an advanced persistent threat (APT) is suggested due to similarities with various Pakistan-linked groups. This disclosure comes on the heels of Cyble uncovering a malicious Android app utilized by the DoNot Team targeting individuals in the Kashmir region of India. The DoNot group, also known as APT-C-35, Origami Elephant, and SECTOR02, is believed to have Indian origins and has a history of using Android malware for infiltration. The group’s persistent efforts to refine tools and techniques highlight the ongoing threat they pose, particularly in the sensitive Kashmir region of India.

Reference:

  • Phishing Campaign Targets Indian Government with Rust-Based Malware
Tags: Cyber AlertCyber Alerts 2023Cyber RiskCyber threatDecember 2023GovernmentIndiaMalwareRusticWeb
ADVERTISEMENT

Related Posts

AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025
hpingbot Botnet Uses Pastebin C2 Channel

APT36 Targets Indian Defense Linux Systems

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

hpingbot Botnet Uses Pastebin C2 Channel

July 7, 2025

Latest Alerts

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

APT36 Targets Indian Defense Linux Systems

hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

Subscribe to our newsletter

    Latest Incidents

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    Ransomware Attack Causes Outage at Ingram

    Call of Duty Players Hacked on Game Pass

    RansomHub Claims Theft of Coppell City Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial