In the vast landscape of cybersecurity threats, state-sponsored cyber espionage groups pose a significant challenge to national security. One such notable threat actor is Transparent Tribe, also known as APT36 (Advanced Persistent Threat 36), which has been actively targeting government entities in India.
This technical analysis delves into the attack chain employed by Transparent Tribe, providing insights into their tactics, techniques, and procedures (TTPs). The observed attack vector involves a multi-stage process, initiated by phishing emails, followed by the distribution of a malicious PowerPoint file embedded with macro code, ultimately resulting in the deployment of a remote access trojan (RAT).