The cyber-espionage group tracked as Mysterious Elephant has matured its operations, graduating from the use of off-the-shelf or recycled malware to deploying its own custom toolset. In campaigns observed since early 2025, the group has focused its efforts on government and diplomatic targets in South Asia. This evolution represents a significant increase in the group's technical sophistication and resourcefulness. By developing bespoke malware, Mysterious Elephant can better evade signature-based defenses, tailor its attacks to specific targets, and maintain long-term persistence for intelligence gathering. The group's activities pose a direct threat to the confidentiality of sensitive government data in South Asia and present an indirect risk to nations with diplomatic and economic ties to the region.
Mysterious Elephant is a cyber-espionage actor whose primary objective appears to be intelligence collection from government entities. The group's recent shift to custom malware is a key indicator of its development. While previously relying on publicly available or shared malware, the group now invests in its own software development. This allows for:
The group's targeting has been precise, focusing on government and diplomatic organizations in South Asia, which suggests a clear geopolitical motive behind its operations.
While specific details of the custom malware are not yet public, the campaign's characteristics are consistent with modern APT operations:
T1566 - Phishing) containing malicious attachments or links designed to entice the specific targets.T1587.001 - Malware) is executed and establishes a foothold on the compromised system. It likely employs standard persistence mechanisms such as creating scheduled tasks or registry run keys (T1547 - Boot or Logon Autostart Execution).T1071 - Application Layer Protocol).T1041 - Exfiltration Over C2 Channel).The primary impact of this campaign is espionage. The theft of sensitive government information, diplomatic cables, and policy documents from South Asian nations can have significant geopolitical consequences. It can undermine negotiations, expose intelligence operations, and provide a strategic advantage to the nation-state sponsoring Mysterious Elephant.
For other countries, such as the UK, Germany, and France, the risks are indirect but still significant:
Detecting custom malware requires a shift from signature-based detection to behavioral analysis.
D3-PA: Process Analysis.D3-NTA: Network Traffic Analysis.M1017 - User Training).D3-EAL: Executable Allowlisting.Mysterious Elephant APT intensifies operations, targeting Bangladesh and Pakistan, using a hybrid toolkit and focusing on consumer messaging apps.
New intelligence from Kaspersky reveals the 'Mysterious Elephant' APT has intensified its cyber espionage in 2025, with Bangladesh emerging as its second most-attacked nation after Pakistan. The group, active since at least 2023, employs a hybrid toolkit, repurposing code from groups like Confucius and Origami Elephant, rather than solely custom tools. A notable focus is intercepting communications on consumer messaging apps like WhatsApp, highlighting a new vector of compromise for government and diplomatic targets in South Asia. This update provides specific target countries and a clearer understanding of their evolving TTPs.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats