Pakistani Hackers Employ Linux Malware “Poseidon” to Compromise Indian Government Networks
On April 19, 2023, cybersecurity researchers reported that a prominent threat actor from Pakistan, known as Transparent Tribe, has utilized a fraudulent two-factor authentication (2FA) tool to deploy a sophisticated Linux backdoor named Poseidon. This malware is specifically designed to target various Indian government agencies, highlighting a concerning escalation in cyber warfare tactics within the region.
According to Tejaswini Sandapolla, a security researcher at Uptycs, Poseidon acts as a second-stage payload linked to Transparent Tribe, which has been previously identified by several aliases, including APT36, Operation C-Major, PROJECTM, and Mythic Leopard. This group has a well-documented history of launching attacks against Indian governmental bodies, military officials, defense contractors, and educational institutions, demonstrating a pattern of persistent focus on strategic entities within India.
Poseidon is characterized as a general-purpose backdoor malware, which grants attackers extensive capabilities for taking control of compromised systems. Its functionalities encompass keylogging, screen capture, file uploads and downloads, as well as remote administration of the infected host. These capabilities enable cybercriminals to execute a broad range of malicious activities, including data exfiltration and surveillance.
In the context of the MITRE ATT&CK framework, this attack exemplifies multiple adversarial tactics and techniques. The use of the 2FA tool suggests initial access leveraging social engineering or other deceptive methods aimed at evading standard cybersecurity defenses. Once access is obtained, the malware establishes persistence within the system, enabling the attackers to maintain control over the infected infrastructure. Furthermore, the potential for privilege escalation may arise as the attackers navigate through compromised systems, enhancing their capabilities and scope of operations.
As cyber threats become increasingly advanced and persistent, the incident underscores the critical importance for businesses and government entities to adopt comprehensive security measures. Understanding such breaches—as demonstrated through the techniques associated with the MITRE framework—can provide valuable insights for organizations seeking to bolster their defense against similar attacks in the future.
This incident not only poses immediate risks to the targeted Indian agencies but also serves as a warning to organizations across the globe about the ever-evolving strategies employed by threat actors. In a world where cyber threats know no borders, vigilance and proactive response strategies remain critical for safeguarding sensitive information and maintaining operational integrity.