Article Details
Scrape Timestamp (UTC): 2025-08-22 18:36:18.714
Original Article Text
Click to Toggle View
APT36 hackers abuse Linux .desktop files to install malware. The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India. The activity, documented in reports by CYFIRMA and CloudSEK, aims at data exfiltration and persistent espionage access. APT 36 has previously used .desktop files to load malware in targeted espionage operations in South Asia. The attacks were first spotted on August 1, 2025, and based on the latest evidence, are still ongoing. Desktop file abuse Although the attacks described in the two reports use different infrastructure and samples (based on hashes), the techniques, tactics and procedures (TTPs), attack chains, and apparent goals are the same. Victims receive ZIP archives through phishing emails containing a malicious .desktop file disguised as a PDF document, and named accordingly. Linux .desktop files are text-based application launchers that contain configuration options dictating how the desktop environment should display and run an application. Users open the .desktop file thinking it's a PDF, which causes a bash command hidden in the 'Exec=' field to create a temporary filename in '/tmp/' where it writes a hex-encoded payload fetched from the attacker's server or Google Drive. Then, it runs 'chmod +x' to make it executable and launches it in the background. To lower suspicion for the victim, the script also launches Firefox to display a benign decoy PDF file hosted on Google Drive. In addition to the manipulation of the 'Exec=' field to run a sequence of shell commands, the attackers also added fields like 'Terminal=false' to hide the terminal window from the user, and 'X-GNOME-Autostart-enabled=true' to run the file at every login. Typically, .desktop files on Linux are plain-text shortcut files, defining an icon, name, and command to execute when the user clicks it. However, in APT36 attacks, the attackers abuse this launcher mechanism to turn it essentially into a malware dropper and persistence establishment system, similarly to how the 'LNK' shortcuts are abused on Windows. Because .desktop files on Linux are typically text, not binaries, and as their abuse isn't widely documented, security tools on the platform are unlikely to monitor them as potential threats. The payload dropped by the malformed .desktop file in this case is a Go-based ELF executable that performs espionage functions. Although packing and obfuscation made analysis challenging, the researchers found that it can be set to stay hidden, or attempt to set up its separate persistence using cron jobs and systemd services. Communication with the C2 is made through a bi-directional WebSocket channel, allowing data exfiltration and remote command execution. Both cybersecurity firms find this latest campaign to be a sign of the evolution of APT36's tactics, which are turning more evasive and sophisticated. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Pakistani APT36 has launched new attacks targeting Indian government and defense sectors, leveraging Linux .desktop files for malware delivery and espionage.
The campaign began on August 1, 2025, and is ongoing, employing phishing emails with ZIP archives containing malicious .desktop files disguised as PDFs.
Victims inadvertently execute a bash script that downloads and runs a hex-encoded payload, while a decoy PDF is displayed to minimize suspicion.
The malware uses a Go-based ELF executable for espionage, employing WebSocket channels for data exfiltration and remote command execution.
Attackers utilize fields like 'Terminal=false' and 'X-GNOME-Autostart-enabled=true' for stealth and persistence, indicating sophisticated tactics.
Security tools struggle to detect these attacks due to the uncommon abuse of text-based .desktop files as malware droppers.
This campaign reflects APT36's evolving and increasingly evasive strategies, posing a significant threat to targeted sectors.