Article Details
Scrape Timestamp (UTC): 2025-03-27 12:33:47.074
Source: https://thehackernews.com/2025/03/apt36-spoofs-india-post-website-to.html
Original Article Text
Click to Toggle View
APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware. An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India's public sector postal system as part of a campaign designed to infect both Windows and Android users in the country. Cybersecurity company CYFIRMA has attributed the campaign with medium confidence to a threat actor called APT36, which is also known as Transparent Tribe. The fraudulent website mimicking India Post is named "postindia[.]site." Users who land on the site from Windows systems are prompted to download a PDF document, whereas those visiting from an Android device are served a malicious application package ("indiapost.apk") file. "When accessed from a desktop, the site delivers a malicious PDF file containing 'ClickFix' tactics," CYFIRMA said. "The document instructs users to press the Win + R keys, paste a provided PowerShell command into the Run dialog, and execute it – potentially compromising the system." An analysis of the EXIF data associated with the dropped PDF shows that it was created on October 23, 2024, by an author named "PMYLS," a likely reference to Pakistan's Prime Minister Youth Laptop Scheme. The domain impersonating India Post was registered about a month later on November 20, 2024. The PowerShell code is designed to download a next-stage payload from a remote server ("88.222.245[.]211") that's currently inactive. On the other hand, when the same site is visited from an Android device, it urges users to install their mobile app for a "better experience." The app, once installed, requests extensive permissions that allow it to harvest and exfiltrate sensitive data, including contact lists, current location, and files from external storage. "The Android app changes its icon to mimic a non-suspicious Google Accounts icon to conceal its activity, making it difficult for the user to locate and uninstall the app when they want to remove it," the company said. "The app also has a feature to force users to accept permissions if they are denied in the first instance." The malicious app is also designed to run in the background continuously even after a device restart, while explicitly seeking permissions to ignore battery optimization. "ClickFix is increasingly being exploited by cybercriminals, scammers, and APT groups, as reported by other researchers observing its use in the wild," CYFIRMA said. "This emerging tactic poses a significant threat as it can target both unsuspecting and tech-savvy users who may not be familiar with such methods."
Daily Brief Summary
APT36, linked to Pakistan, created a counterfeit India Post website to distribute malware targeting Windows and Android users in India.
The cybersecurity firm CYFIRMA attributed this malicious campaign to APT36 with medium confidence, identifying the group by its alternate name, Transparent Tribe.
When accessed from a Windows system, the fraudulent site prompts users to download a PDF that instructs them to execute a PowerShell script, potentially compromising the system.
Android users are tricked into downloading a malicious app that requests extensive permissions to access and exfiltrate sensitive data, like contact lists and location.
The Android malware changes its icon to resemble a Google Accounts icon to evade detection and prevent easy uninstallation.
The malicious PDF and app are designed to persist in their actions, including evading battery optimization and restarting after rebooting the device.
The domain used for the fake site was registered in November 2024, and the PowerShell script connects to an inactive server, indicating ongoing or future malicious activities.
The tactic, dubbed "ClickFix," used in the campaign is noted for its increasing prevalence among cybercriminals, targeting both less tech-savvy and knowledgeable users.