Pakistan’s ‘Transparent Tribe’ Aims to Have Cross-Platform Impact with APT

Published:

spot_img

Transparent Tribe: Pivoting to Target Linux and Legitimate Software Techniques

In a recent development in the world of cyber-espionage, a Pakistan-linked group known as Transparent Tribe has expanded its tactics to include a wider range of legitimate software techniques in order to evade cybersecurity defenses. This shift includes targeting Linux systems as much as Windows, as well as incorporating legitimate cloud services like Google Drive and Telegram into their attacks.

Historically, Transparent Tribe has focused on targeting government agencies and defense firms in India, using cyberattacks to compromise Windows systems and Android devices. However, in their latest campaign, the group has shifted its focus to Linux systems, with 65% of attacks using Linux Executable and Linkable Format (ELF) binaries that target India’s MayaOS distribution.

According to Ismael Valenzuela, vice president of threat intelligence and research at cybersecurity firm BlackBerry, Transparent Tribe remains primarily focused on compromising India’s government, military, and private industry. Despite targeting other regions like the US, Europe, and Australia in the past, India remains their primary target.

The group’s use of cross-platform programming languages like Python, Golang, and Rust allows them to create programs for both Windows and Linux, with their latest attack using ELF binaries to distribute a Python-based downloader. Additionally, Transparent Tribe has been experimenting with new delivery mechanisms, including utilizing Linux desktop entry files as an attack vector.

Overall, Transparent Tribe’s adoption of legitimate tools and services as part of their attack infrastructure demonstrates a growing trend in cyber-threat landscapes. By leveraging seemingly benign software in malicious ways, these threat actors can operate under the radar and effectively hide in plain sight. The group’s evolving tactics highlight the importance of staying vigilant and adapting cybersecurity defenses to combat emerging threats in the digital realm.

spot_img

Related articles

Recent articles

PumaBot: New Botnet Aims at Linux IoT Devices to Hijack SSH Credentials and Mine Cryptocurrency

New PumaBot Botnet Targets Embedded Linux IoT Devices Overview of PumaBot A new botnet named PumaBot is specifically targeting embedded Linux-based Internet of Things (IoT) devices,...

Is Your IRS Refund Check on the Dark Web? Discover What 7 On Your Side Investigates

Surge in Check Theft: How California Residents Are Being Targeted The sun might shine brightly in California, but it casts dark shadows when it comes...

Microsoft OneDrive Flaw Allows Apps Full Cloud Access with Single File Upload

Security Flaw Discovered in Microsoft OneDrive File Picker Published on May 28, 2025 by Ravie Lakshmanan Tags: Data Privacy, Vulnerability A Serious Security Vulnerability Recent findings from cybersecurity...

OPEC+ Announces Increase in Oil Production

OPEC+ Announces Oil Production Increase for July OPEC+ member nations have officially revealed plans to significantly ramp up oil production levels starting in July. This...