Researchers have identified a significant shift in the targeting strategy of Transparent Tribe (also known as APT36), an advanced persistent threat (APT) group linked to Pakistan. Historically focused on Indian government and military organizations, the group is now actively targeting India's startup ecosystem. The new campaign employs the group's signature backdoor, Crimson RAT, to infiltrate companies, particularly those in the cybersecurity and intelligence sectors. The attacks leverage social engineering, using startup-themed lures and malicious ISO files delivered via phishing emails. This pivot indicates a strategic interest in stealing intellectual property and potentially using these startups as a stepping stone for supply chain attacks against their government and law enforcement customers.
The campaign demonstrates a tactical evolution for Transparent Tribe, moving beyond traditional government espionage to target emerging technology sectors that may have less mature security postures. By compromising security startups, the group could gain insights into India's cyber defense capabilities or leverage trusted relationships to attack more sensitive targets.
The attack chain observed in this campaign is consistent with Transparent Tribe's established TTPs, with modifications to suit the new target set.
Initial Access: The attack begins with a spearphishing email (T1566.001) sent to individuals within the target startup. The email contains a malicious ISO file (.iso) as an attachment.
Execution: The user is tricked into mounting the ISO file and executing its contents. ISO files are used to bypass email gateway security controls that might block more common malicious file types like .exe or .zip. The executable within the ISO acts as a dropper for Crimson RAT.
Defense Evasion: To enhance credibility, the attackers have been observed using personal information scraped from real startup founders, making the phishing lures highly convincing (T1589.002).
Command and Control: Once installed, Crimson RAT establishes a connection to an attacker-controlled C2 server. This RAT is a .NET-based backdoor capable of:
This campaign poses a multi-faceted threat to India's technology sector and national security:
.iso. Emphasize verification of sender identity before opening attachments..iso, .img, and .vhd attachments, as these are increasingly used to deliver malware.Train users to identify and report phishing attempts, especially those with unusual attachments like ISO files.
Block or quarantine uncommon and high-risk file types like .iso at the email gateway.
Use application control to prevent the execution of unauthorized code from locations like mounted disk images.
Deploy endpoint protection with behavioral detection capabilities to identify and block the execution and persistence mechanisms of Crimson RAT.
To counter the delivery mechanism used by Transparent Tribe, organizations must enhance their email security gateways with robust file analysis capabilities. Specifically, the system should be configured to recursively unpack and scan container files, including ISO disk images. Since attackers use ISO files to hide their malicious executable payload from basic scanners, a sandbox or dynamic analysis engine is required to mount the image and inspect its contents for malicious indicators. Rules should be created to flag or block any email containing an ISO file that includes an executable. This directly disrupts the initial access stage of the attack, preventing the Crimson RAT dropper from ever reaching the end user's machine.
Implementing application control, or executable allowlisting, provides a powerful defense against the execution of Crimson RAT. Even if a user is tricked into mounting the malicious ISO file, an allowlisting policy would prevent the unknown RAT executable from running. Security teams should deploy application control in an audit mode first to build a baseline of legitimate applications used in the environment. Once the baseline is established, the policy can be moved to enforcement mode. This ensures that only approved and vetted software can execute, effectively blocking the malware dropper contained within the ISO. This is particularly effective on servers and workstations with standardized software sets.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats