This report provides an overview of various threat actors and their activities in the cybersecurity landscape. It highlights the DoNot Team, Transparent Tribe , and Mysterious Elephant , all suspected to be state-sponsored groups originating from India. These actors employ sophisticated techniques to spread malware and target specific sectors.
The DoNot Team   , also known as APT-C-35  , Origami Elephant  , and SECTOR02  , has been active since 2016  . They are associated with the use of a new NET-based backdoor called Firebird. This backdoor has affected a limited number of victims in Pakistan and Afghanistan . Recent findings from Kaspersky’s APT trends report Q3 2023 indicate ongoing development efforts by the DoNot Team, as they utilize a downloader named CSVtyrei, resembling Vtyrei  . The group employs specialized phishing emails and fake Android applications to distribute malware .
Transparent Tribe , also known as APT36  , has been active since 2013  . They have recently targeted Indian government sectors with an updated malware arsenal , including a new Windows trojan called ElizaRAT . Transparent Tribe has also targeted Linux systems in the past.
Mysterious Elephant , also known as APT-K-47  , has been attributed to a spear-phishing campaign in Pakistan . They utilize a backdoor called ORPCBackdoor. This group shares tooling and targeting overlaps with other actors aligned with India , such as SideWinder , Patchwork , Confucius , and Bitter .
The activities of these threat actors have significant implications for cybersecurity. It is crucial for organizations and governments to remain vigilant and implement robust security measures to mitigate the risks posed by these groups. Ongoing monitoring and collaboration between security researchers and law enforcement agencies are essential to stay ahead of evolving threats. As these actors continue to develop new techniques and malware, it is imperative to adapt and enhance defensive strategies to protect against future attacks.