Transparent Tribe (APT36) Shifts Focus, Targeting Indian Startups with Crimson RAT

Pakistan-linked APT Transparent Tribe Pivots from Government to Target India's Startup Ecosystem

HIGH
February 7, 2026
5m read
Threat ActorPhishingCyberattack

Related Entities

Full Report

Executive Summary

Researchers have identified a significant shift in the targeting strategy of Transparent Tribe (also known as APT36), an advanced persistent threat (APT) group linked to Pakistan. Historically focused on Indian government and military organizations, the group is now actively targeting India's startup ecosystem. The new campaign employs the group's signature backdoor, Crimson RAT, to infiltrate companies, particularly those in the cybersecurity and intelligence sectors. The attacks leverage social engineering, using startup-themed lures and malicious ISO files delivered via phishing emails. This pivot indicates a strategic interest in stealing intellectual property and potentially using these startups as a stepping stone for supply chain attacks against their government and law enforcement customers.

Threat Overview

  • Threat Actor: Transparent Tribe (APT36, Mythic Leopard, ProjectM).
  • Associated Country: Pakistan.
  • Target: Indian startup companies, with a focus on the cybersecurity and intelligence sectors.
  • Malware: Crimson RAT.
  • Attack Vector: Phishing emails containing malicious ISO container files disguised as legitimate documents.
  • Objective: Intelligence gathering, intellectual property theft, and potential supply chain compromise.

The campaign demonstrates a tactical evolution for Transparent Tribe, moving beyond traditional government espionage to target emerging technology sectors that may have less mature security postures. By compromising security startups, the group could gain insights into India's cyber defense capabilities or leverage trusted relationships to attack more sensitive targets.

Technical Analysis

The attack chain observed in this campaign is consistent with Transparent Tribe's established TTPs, with modifications to suit the new target set.

  1. Initial Access: The attack begins with a spearphishing email (T1566.001) sent to individuals within the target startup. The email contains a malicious ISO file (.iso) as an attachment.

  2. Execution: The user is tricked into mounting the ISO file and executing its contents. ISO files are used to bypass email gateway security controls that might block more common malicious file types like .exe or .zip. The executable within the ISO acts as a dropper for Crimson RAT.

  3. Defense Evasion: To enhance credibility, the attackers have been observed using personal information scraped from real startup founders, making the phishing lures highly convincing (T1589.002).

  4. Command and Control: Once installed, Crimson RAT establishes a connection to an attacker-controlled C2 server. This RAT is a .NET-based backdoor capable of:

    • Collecting and exfiltrating files (T1041).
    • Capturing screenshots (T1113).
    • Logging keystrokes (T1056.001).
    • Stealing credentials from browsers.
    • Executing arbitrary commands.

Impact Assessment

This campaign poses a multi-faceted threat to India's technology sector and national security:

  • Intellectual Property Theft: The primary risk is the theft of proprietary technology, source code, and business plans from innovative startups, undermining their competitive advantage.
  • Supply Chain Risk: By compromising startups that provide security services to law enforcement and government agencies, Transparent Tribe can create a supply chain attack vector. A backdoor in the startup's product could lead to the compromise of its sensitive government clients.
  • Economic Espionage: The intelligence gathered can provide strategic insights into the health and direction of India's technology industry, a key component of its economy.

Detection & Response

  • Email Security: Deploy advanced email security solutions that can inspect file attachments within container files like ISOs and detect malicious content.
  • Endpoint Monitoring: Use EDR to monitor for the execution of files from mounted ISO images. Create detection rules for the known behaviors of Crimson RAT, such as its specific registry keys for persistence and C2 communication patterns.
  • User Training: Train employees to be suspicious of unsolicited emails, especially those containing attachments with unusual file types like .iso. Emphasize verification of sender identity before opening attachments.
  • Threat Intelligence: Monitor for IOCs associated with Transparent Tribe and Crimson RAT and integrate them into security controls.

Mitigation

  • Block Disk Image Files: Configure email gateways and endpoint security policies to block or quarantine emails with .iso, .img, and .vhd attachments, as these are increasingly used to deliver malware.
  • Application Control: Use application control policies to prevent the execution of unauthorized software, including executables run from temporary locations or removable media.
  • PowerShell Hardening: Enforce constrained language mode for PowerShell and enable script block logging to detect and prevent malicious script execution, a common follow-on activity for RATs.
  • User Account Permissions: Ensure users operate with standard, non-administrative privileges to limit the malware's ability to install itself and gain persistence.

Timeline of Events

1
February 7, 2026
This article was published

MITRE ATT&CK Mitigations

Train users to identify and report phishing attempts, especially those with unusual attachments like ISO files.

Block or quarantine uncommon and high-risk file types like .iso at the email gateway.

Use application control to prevent the execution of unauthorized code from locations like mounted disk images.

Deploy endpoint protection with behavioral detection capabilities to identify and block the execution and persistence mechanisms of Crimson RAT.

D3FEND Defensive Countermeasures

To counter the delivery mechanism used by Transparent Tribe, organizations must enhance their email security gateways with robust file analysis capabilities. Specifically, the system should be configured to recursively unpack and scan container files, including ISO disk images. Since attackers use ISO files to hide their malicious executable payload from basic scanners, a sandbox or dynamic analysis engine is required to mount the image and inspect its contents for malicious indicators. Rules should be created to flag or block any email containing an ISO file that includes an executable. This directly disrupts the initial access stage of the attack, preventing the Crimson RAT dropper from ever reaching the end user's machine.

Implementing application control, or executable allowlisting, provides a powerful defense against the execution of Crimson RAT. Even if a user is tricked into mounting the malicious ISO file, an allowlisting policy would prevent the unknown RAT executable from running. Security teams should deploy application control in an audit mode first to build a baseline of legitimate applications used in the environment. Once the baseline is established, the policy can be moved to enforcement mode. This ensures that only approved and vetted software can execute, effectively blocking the malware dropper contained within the ISO. This is particularly effective on servers and workstations with standardized software sets.

Sources & References

Transparent Tribe Hacker Group Attacking India's Startup Ecosystem
GBHackers on Security (gbhackers.com) February 6, 2026
Transparent Tribe Hacker Group Attacking India's Startup Ecosystem
Team Vin Global (teamwinglobal.com) February 7, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APTCrimson RATISO filePhishingStartupIndiaPakistan

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading