Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsRATs in the Machine: Inside a Pakistan-Linked Three-Pronged Cyber Assault on India
RATs in the Machine: Inside a Pakistan-Linked Three-Pronged Cyber Assault on India
Cybersecurity

RATs in the Machine: Inside a Pakistan-Linked Three-Pronged Cyber Assault on India

•February 10, 2026
0
SecurityWeek
SecurityWeek•Feb 10, 2026

Companies Mentioned

Aryaka

Aryaka

Microsoft

Microsoft

MSFT

Why It Matters

The attacks illustrate a shift toward economic espionage, targeting India’s expanding defense budget and trade negotiations, and signal heightened cyber risk for regional stakeholders.

Key Takeaways

  • •GETA RAT exploits Windows mshta, XAML for stealthy access
  • •ARES RAT targets Linux via systemd services, exfiltrates data
  • •Desk RAT delivered through malicious PowerPoint add‑in, uses WebSocket C2
  • •Phishing attachments remain primary initial access vector
  • •Economic espionage intensifies amid India’s rising defense spending

Pulse Analysis

State‑sponsored cyber espionage is evolving from traditional geopolitical posturing to a tool for economic advantage. The Transparent Tribe, linked to Pakistan’s APT36, exemplifies this trend by targeting India’s defense sector amid a broader trade and tariff conflict. Unlike classic nation‑state attacks that focus on critical infrastructure, these operations prioritize intelligence on defense procurement and policy shifts, feeding into competitive market strategies. This strategic pivot underscores how cyber capabilities are becoming integral to national economic agendas, blurring the line between geopolitical and commercial objectives.

Technically, the campaign’s three RAT families demonstrate a sophisticated, cross‑platform approach. GETA leverages .NET and Windows native components such as mshta.exe and XAML deserialization, allowing in‑memory execution that evades signature scanners. ARES, built in Python, persists through systemd user services on Linux, enabling continuous data profiling and exfiltration via a Go‑based downloader. Desk RAT introduces a novel delivery vector—malicious PowerPoint add‑ins—communicating over encrypted WebSocket channels. The consistent use of living‑off‑the‑land binaries and encrypted C2 underscores a focus on stealth and resilience, complicating detection for traditional endpoint solutions.

For Indian enterprises and government agencies, the implications are clear: conventional defenses must adapt to multi‑vector, multi‑OS threats that blend into everyday user workflows. Enhanced threat‑intel sharing, behavior‑based detection, and rigorous phishing awareness programs are essential to counter these persistent footholds. Moreover, the broader regional landscape suggests that similar economically motivated campaigns will proliferate, prompting a reassessment of cyber risk models that factor in trade dynamics alongside traditional security concerns. Proactive investment in adaptive security architectures will be critical to safeguarding both national interests and commercial competitiveness.

RATs in the Machine: Inside a Pakistan-Linked Three-Pronged Cyber Assault on India

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...