What Are the Sinister Cyber Campaigns Linked to Pakistan Targeting India?

Share:
Audio Loading voice…
What Are the Sinister Cyber Campaigns Linked to Pakistan Targeting India?

Synopsis

New revelations unveil alarming cyber campaigns linked to Pakistan targeting India's government sectors. Understanding these tactics is crucial as they evolve, raising significant security concerns. Stay informed about the implications of these operations on national security and the steps being taken against such threats.

Key Takeaways

New cyber campaigns have emerged targeting India from Pakistan.
Operations Gopher Strike and Sheet Attack employ sophisticated techniques.
Phishing emails and legitimate services are used for command-and-control.
Malware can remotely control infected machines.
APT36, known for persistent surveillance, is attributed to these attacks.

New York/New Delhi, Jan 28 (NationPress) Recent findings indicate that governmental entities in India have been subjected to two distinct cyber operations conducted by a threat group based in Pakistan, utilizing previously unrecorded tactics. This revelation comes from a report detailing the operations, which have been named Gopher Strike and Sheet Attack by Zscaler ThreatLabz, who identified these activities in September 2025, as reported by the renowned cybersecurity platform, The Hacker News.

“Although these operations exhibit some resemblances to the Pakistan-related Advanced Persistent Threat (APT) group, APT36, we have medium confidence that the activities observed in this analysis may be the work of a new subgroup or a different Pakistan-affiliated group operating simultaneously,” researchers Sudeep Singh and Yin Hong Chang stated, as cited by The Hacker News.

The Sheet Attack derives its name from the exploitation of legitimate platforms such as Google Sheets, Firebase, and email for command-and-control (C2) purposes.

Conversely, the Gopher Strike is believed to have utilized phishing emails as an initial method to distribute PDF files containing a distorted image, overlaid with an innocuous pop-up prompting the recipient to download an update for Adobe Acrobat Reader DC.

As per The Hacker News, victims are urged to install the “necessary update” to view the document contents. When individuals click the “Download and Install” button in the fraudulent update dialog, an ISO image file is downloaded, but only if the requests are made from IP addresses situated in India and the User-Agent string matches Windows.

“These server-side checks hinder automated URL analysis tools from retrieving the ISO file, ensuring that the harmful file is only sent to targeted individuals,” Zscaler noted.

Earlier this month, another report highlighted that hackers linked to Pakistan have initiated a new espionage effort aimed at the Indian government and educational institutions, including critical organizations, to acquire sensitive information by incapacitating systems through spyware and malware.

This alarming campaign was identified by researchers at the cybersecurity firm Cyfirma, which claims to have uncovered the techniques employed by these cyber spies.

“The operation starts with spear-phishing emails that contain a ZIP file with a malicious document masquerading as a PDF. Upon opening, the file deploys two malware components named ReadOnly and WriteOnly,” The Record reported, citing various instances of security breaches.

The malware infiltrates victims’ systems, modifying its behavior based on the installed antivirus software.

According to Cyfirma, this software can take remote control of infected computers, compromise classified information, and conduct ongoing surveillance—such as capturing screenshots, tracking clipboard activity, and enabling remote desktop access.

This could also facilitate the theft of overwritten copied data, allowing attackers to seize cryptocurrency transactions.

This covert surveillance has been linked to APT36, also known as Transparent Tribe, a long-standing threat actor accused of monitoring governmental bodies, military-affiliated organizations, and universities.

While experts have previously characterized Transparent Tribe as less technically sophisticated than some rival espionage groups, they have acknowledged its persistence and adaptability in tactics over time.

Reports indicate that APT36 has been operational since 2013, engaging in cyber-espionage campaigns against governmental and military institutions in India, Afghanistan, and various establishments across approximately 30 countries.

Point of View

It is essential to acknowledge the critical nature of these cyber threats facing India. The persistence and adaptability of these cyber actors highlight the ongoing challenges in safeguarding our national security. Our commitment remains to inform the public while addressing these threats with utmost seriousness.
NationPress
8 May 2026

Frequently Asked Questions

What are Gopher Strike and Sheet Attack?
Gopher Strike and Sheet Attack are recent cyber campaigns targeting Indian government entities, identified as utilizing undocumented tactics by a Pakistan-linked threat actor.
How do these cyber campaigns impact national security?
These campaigns pose significant risks to national security by compromising sensitive data and threatening governmental operations.
What measures can be taken to enhance cybersecurity?
Implementing robust cybersecurity protocols, employee training on phishing awareness, and regular system updates can significantly enhance defenses against such threats.
Who is behind these cyber campaigns?
The cyber campaigns are reportedly conducted by a Pakistan-linked threat group, possibly a new subgroup of the Advanced Persistent Threat (APT) group APT36.
What types of malware are being used?
The operations utilize various types of malware, including components named ReadOnly and WriteOnly, designed to compromise systems and conduct surveillance.
Nation Press
The Trail

Connected Dots

Tracing the thread behind this story — newest first.

8 Dots
  1. Latest 1 month ago
  2. 3 months ago
  3. 4 months ago
  4. 6 months ago
  5. 8 months ago
  6. 12 months ago
  7. 12 months ago
  8. 1 year ago
Google Prefer NP
On Google