Close Menu
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
What's Hot

Regeneron Pharmaceuticals to buy 23andMe and its data for $256 million

May 19, 2025

We’re adding to our newest stock on the dip. It was a winner in Trump’s Mideast trip

May 19, 2025

Deel wants Rippling to hand over any agreements involving paying the alleged spy

May 19, 2025
Facebook X (Twitter) Instagram
Trending
  • Regeneron Pharmaceuticals to buy 23andMe and its data for $256 million
  • We’re adding to our newest stock on the dip. It was a winner in Trump’s Mideast trip
  • Deel wants Rippling to hand over any agreements involving paying the alleged spy
  • Uber eyes B2B logistics push in India through state-backed open commerce network
  • Trump targets ballot barcodes, long a source of misinformation
  • VUZ gets $12M for its immersive video experiences across emerging markets and the U.S.
  • Qualcomm to launch data center processors that link to Nvidia chips
  • Crypto elite increasingly worried about their personal safety
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech InnovationsRoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Monday, May 19
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Home » Pakistan APT Hackers Create Weaponized IndiaPost Website to Attack Windows & Android Users

Pakistan APT Hackers Create Weaponized IndiaPost Website to Attack Windows & Android Users

GTBy GTMarch 27, 2025 Cybersecurity No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


Pakistan APT Hackers Create Weaponized IndiaPost Website to Attack Windows & Android Users

Cybersecurity researchers have uncovered a sophisticated attack campaign leveraging a fraudulent website that impersonates the Indian Post Office to deliver malware to both Windows and Android users.

The fake website, hosted at postindia[.]site, employs device detection techniques to serve tailored malicious payloads based on the victim’s operating system, demonstrating the threat actor’s technical sophistication and calculated approach.

When accessed via desktop browsers, the malicious site attempts to gain clipboard access and prompts users to download a PDF containing “ClickFix” instructions.

These instructions guide victims to press Win+R and paste a PowerShell command, potentially compromising their systems with malware.

Mobile visitors, meanwhile, are prompted to download an APK file named “indiapost.apk” that requests extensive permissions to access sensitive data.

Malicious Indiapost.apk (Source – Cyfirma)

Cyfirma researchers identified the campaign in March 2025 during routine threat monitoring activities.

Their analysis revealed metadata suggesting the attack originated from Pakistan-based threat actors, specifically APT36 (also known as Transparent Tribe), a group with a history of targeting Indian entities since at least 2013.

Technical examination of the PDF’s metadata showed it was created in October 2024 within Pakistan’s time zone (+5:00), with the author labeled as “PMYLS” – an abbreviation for Pakistan’s Prime Minister Youth Laptop Scheme.

This evidence, combined with the tactics employed, led researchers to attribute the campaign to APT36 with moderate confidence.

The attackers employed strategic infrastructure, including IP address 88[.]222[.]245[.]211, which resolves to the suspicious domain email[.]gov[.]in[.]gov-in[.]mywire[.]org, a known tactic of Pakistan-based APT groups attempting to impersonate Indian government entities.

Infection Mechanism Analysis

The campaign’s infection technique is particularly notable for its multi-platform approach.

Attack Chain (Source – Cyfirma)

The website’s HTML code contains a JavaScript function that detects whether visitors are using mobile or desktop devices and serves appropriate content accordingly:-

HTML code contains a JavaScript function (Source – Cyfirma)

function detectDevice() {
const isMobile = /iPhone|iPad|iPod|Android/.test(navigator.userAgent);
if (isMobile) {
dialogTitle.textContent = “Get Our App”;
actionButton.href = “https://postindia.site/download/indiapost.apk”;
} else {
dialogTitle.textContent = “Download Tracking Information”;
actionButton.href = “https://drive.usercontent.google.com/download?id=1RSILmV3HDR6APXKWEPXrg2MRP1d2xwmb&export=download”;
}
}

The Android malware demonstrates sophisticated evasion tactics by changing its icon to mimic a Google Accounts app and employs persistence mechanisms through the BootReceiver function.

It requests numerous permissions including contacts access, location tracking, and clipboard monitoring, while implementing techniques to bypass battery optimization restrictions to maintain continuous operation.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free



Source link

GT
  • Website

Keep Reading

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments

China Reportedly Admits Their Role in Cyber Attacks Against U.S. Infrastructure

APT32 Hackers Weaponizing GitHub to Attack Cybersecurity Professionals & Enterprises

10 Best IT Asset Management Tools

Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Regeneron Pharmaceuticals to buy 23andMe and its data for $256 million

May 19, 2025

Qualcomm to launch data center processors that link to Nvidia chips

May 19, 2025

Grok’s ‘white genocide’ responses show gen AI tampered with ‘at will’

May 17, 2025

Tech IPO market is finally showing signs of life

May 16, 2025
Latest Posts

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

May 15, 2025

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

May 6, 2025

Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments

May 1, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to RoboNewsWire, your trusted source for cutting-edge news and insights in the world of technology. We are dedicated to providing timely and accurate information on the most important trends shaping the future across multiple sectors. Our mission is to keep you informed and ahead of the curve with deep dives, expert analysis, and the latest updates in key industries that are transforming the world.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 Robonewswire. Designed by robonewswire.

Type above and press Enter to search. Press Esc to cancel.

STEAM Education

At FutureBots, we believe the future belongs to creators, thinkers, and problem-solvers. That’s why we’ve made it our mission to provide high-quality STEM products designed to inspire curiosity, spark innovation, and empower learners of all ages to shape the world through robotics and technology.