🛡️
./Malfav.asm
Linkedin
  • 👋./Malfav.asm
    • 🕸️Malfav Agenda
  • 🕷️Malware Introduction
    • 💡What is Malware
      • 🌠FIN Malware
      • 🦘Cyber Gang Malware
        • 🕷️Spiders Malware
      • 🕵️‍♀️Cyber Espionage Malware
      • 🍘Cyber Sabotage Malware
      • 🛴Rootkit
        • 🫚Bootkit
    • 🦫Nations State APT
      • 🗯️APT
      • 🇮🇷Iran APT
      • 🇷🇺Russian APT
      • 🇨🇳Chines APT
      • 🇮🇳India APT
      • 🇵🇰Pakistan APT
      • 🇻🇳Vietnamese APT
      • 🇰🇵North Korean APT
    • 🥋Mobile Malware
      • 📲Android Malware
        • 💰Commerical Android Malware
          • Common Android Spyware
        • 🧧Common Android Exploits
          • 0️Common Android 0day
      • 📱IPHONE Malware
        • 🐚Common IPHONE Spyware
        • 💥Commerical IPHONE Malware
        • 💣Common IPHONE Exploits
    • 📃Malicious Documents
      • 📨Excel Spreadsheets
      • 🗼PowerPoint Presentations
      • 🤺Microsoft Office Documents
      • 📑PDF
      • 📄Other Document Formats
      • 🩼Common Techniques Used in Malicious Documents
    • 🏞️Advanced Persistence Threat - APT
      • 🥠APT Groups
        • 🇨🇳Mustang Panda
        • 🛕Mustard Tempest
        • 🇨🇳Naikon
        • 🪡NEODYMIUM
        • 🇷🇺Nomadic Octopus
        • 🇮🇷OilRig
        • 🍊Orangeworm
        • 🇮🇳Patchwork
        • 🇨🇳PittyTiger
        • 🌏PLATINUM
        • 🇱🇧POLONIUM
        • 🇵🇹Poseidon Group
        • 🇹🇲PROMETHIUM
        • 🇨🇳Putter Panda
        • 🦝Rancor
        • 🇨🇳Rocke
        • 🐢RTM
        • 🇷🇺Sandworm Team
        • 🃏Scarlet Mimic
        • 🇬🇱Scattered Spider
        • 🇵🇰SideCopy
        • 🇮🇳Sidewinder
        • 🔕Silence
        • 🇮🇷Silent Librarian
        • 🇳🇬SilverTerrier
        • 🐞Sowbug
        • 🔱Strider
        • 🇨🇳Suckfly
        • 🥃TA2541
        • 🇨🇳TA459
        • 💼TA505
        • 💰TA551
        • ☁️TeamTNT
        • 🇷🇺TEMP.Veles
        • 🦳The White Company
        • 💳Threat Group-1314
        • 🫓Threat Group-3390
        • 🇨🇳Threat Group-3390
        • 🦐Thrip
        • 🐈ToddyCat
        • 🐙Tonto Team
        • 🇵🇰Transparent Tribe
        • 🐠Tropic Trooper
        • 🐢Turla
        • 🇮🇷UNC788
        • 🇱🇧Volatile Cedar
        • 🇨🇳Volt Typhoon
        • 🕊️Whitefly
        • 🔘Windigo
        • 🪽Windshift
        • 🇨🇳Winnti Group
        • 🥀WIRTE
        • 🇷🇺Wizard Spider
        • 🎪ZIRCONIUM
      • 🏹APT's Software
        • 🐀3PARA RAT
        • 🐀4H RAT
        • ⚱️AADInternals
        • 🔻ABK
        • ⚗️AbstractEmu
        • 🪱ACAD/Medre.A
        • 🇲🇰AcidRain
        • 🐬Action RAT
  • 🐁OS Internal's
    • 🍩Suspicious API's
      • 🪨Process Information API's
      • 🧩Registry API's
      • 🔒Encryption API's
      • 📯Restore Point API's
      • 👾Exfiltration API's
      • 🦉Data Wiping API's
      • 📨Shadow Copy API's
      • 🪼What is Malicious API's Functions
      • 🌪️System Information API's
      • 🌀Network Information API's
  • 🪟Windows Internal
    • 📡Windows Internal
      • 🦐Why Windows Internal ?
        • 🏵️Process
        • 🧵Thread
        • 🪭Handle
        • 🌐Memory
        • ☢️Ram
        • 🤖ROM
  • 👁️‍🗨️Malware Technique
    • 📓Malware Technique
    • 💢Obfuscation
      • 🦾Anti-Debugging Techniques
      • 🏗️Instruction Substitution
      • 📔Code Obfuscation
      • 📦Code Packing
      • 💈Polymorphism
      • 🌬️Control Flow Obfuscation
      • 🪅Data Obfuscation
      • 💅Metadata Obfuscation
      • 🎣Metamorphism
      • ⛲Runtime Obfuscation
    • 🛌Persistence Mechanism
      • 🔰Registry Persistence Mechanism
      • 🗑️Task Sch Persistence Mechanism
      • 📂Startup Folder
      • 🎋AppData Folder
      • 🪹Temp Folder
  • ⚔️Malware Resources
    • 👻Malware Resources
    • 🎇Malware Sample Resources
      • 🌡️VirusShare
      • ♠️MalShare
      • 🚥MalwareTraffic
      • 🚏Malware Bazaar
  • Malware Analysis Toolkit
    • 🧌Windows Malware Analysis Toolkit
      • 💉Common Online Malware Analysis Toolkit
        • 💎Joe Sandbox
        • 🎪VT - VirusTotal
        • 👽Threat.Zone
        • 🐦Hybrid Analysis
        • 🦄Any.run
        • 🥫Filescan
      • 🥝Static Analysis Tools
        • 🍡Advance Static Analysis Tool
      • 💠Dynamic Analysis Tool
        • Advance Dynamic Analysis Tool
      • 🥜Network Analysis Tool
      • 🥟String Dumpers Toolkit
        • 📏Strings
        • 🦞Floss
    • 📱Android Malware Analysis Toolkit
      • 🕹️Static Analysis Toolkit
      • 💠Dynamic Analysis Toolkit
      • 🫒Online Analysis Toolkit
    • 📱IPHONE Malware Analysis Toolkit
      • 🥢Static Analysis Toolkit
      • ♦️Dynamic Analysis Toolkit
    • 💻MAC OSX Malware Analysis Toolkit
      • 📯Static Analysis Toolkit
      • 🍭Dynamic Analysis Toolkit
      • 🌬️Online Analysis Toolkit
  • Books and Guidelines
    • 🔋Books and Guidelines for Malware Analysis .
      • 🏋️‍♀️Android Malware Analysis 101
      • 🥖Common Anti-Forensics
      • 🦣Memory Forensics GUI
      • 📼Assembly for Malware Analyst
      • 💾Disk Image Forensics
      • ⚡Volatility Noob to Pro
  • 📋Malware Analysis Tips
    • 🖇️Malware Analysis Tips
      • 🏮Memory Malware Analysis
      • 🐜Technique to Investigate Process
      • 💥Process Lists 1
      • 💥Process Lists 2
      • 💥Process Lists 3
  • 🧽Incident Response
    • 🐳What is Incident Response
      • Incident Response Tools
      • Incident Response Toolkit
  • Technical Analysis Report
    • 🦎Technical Analysis Report
      • 🧲Stuxnet Memory Analysis
  • 🚨Rootkit Removal
    • 🤖Rootkit Removal
  • 🗜️Antivirus Artifact
    • 〽️Antivirus Artifact
      • 🀄Antivirus Process Name
  • 🧠Malware Author Mindset
    • 💽Malware Author Mindset
      • 🍫How Malware Author Terminate Antivirus Process during runtime ?
Powered by GitBook
On this page
  1. Malware Introduction
  2. Nations State APT

India APT

Indian Advanced Persistent Threat (APT) groups are involved in a range of cyber-espionage and cyber-attack activities, often focusing on national security, political, and economic interests. While less publicized compared to some other nation-state actors, these groups have demonstrated significant capabilities in cyber operations. Here is an overview of notable Indian APT groups and their activities:

Notable Indian APT Groups

  1. APT40

    • Aliases: OceanLotus, Stardust Chollima

    • Affiliation: While primarily linked to Chinese interests, APT40 has shown collaboration with or influence from Indian operations.

    • Targets: Aerospace, energy, and petrochemical industries.

    • Notable Activities: Industrial espionage and attacks on critical infrastructure.

  2. APT41

    • Aliases: Barium, Winnti

    • Affiliation: Chinese but has been known to interact with Indian operations.

    • Targets: Technology, healthcare, and other sectors.

    • Notable Activities: Cyber-espionage and financially motivated attacks.

  3. Operation Gold Dust

    • Affiliation: Indian state-sponsored

    • Targets: Various national and international targets.

    • Notable Activities: Specific details are limited but involve cyber-espionage and intelligence gathering.

  4. APT39

    • Aliases: Ongoing investigation and identification

    • Affiliation: Indian government-related

    • Targets: Government officials, political figures, and sensitive sectors.

    • Notable Activities: Espionage and surveillance operations, often involving malware and data exfiltration.

Characteristics and Tactics

  • Phishing and Spear-Phishing: Use of phishing emails and social engineering techniques to compromise targets.

  • Custom Malware: Development and deployment of custom malware tailored for specific espionage and cyber-attack objectives.

  • Surveillance and Espionage: Focus on gathering intelligence related to political, economic, and defense sectors.

PreviousChines APTNextPakistan APT

Last updated 10 months ago

🕷️
🦫
🇮🇳
Page cover image