1. Transparent Tribe (APT36)
- Targets: Indian military personnel, defense contractors, IITs, and NITs.
- Tactics: Phishing campaigns using fake policy documents, remote access tools (RATs), and data exfiltration.
- Impact: Access to confidential defense-related files and research materials.
🔗 India Today
🔗 Sakshi Post
2. Team Insane Pk
- Targets: Indian government websites including Delhi Police, Ministry of Health, and state portals.
- Timing: Around G20 Summit in 2023–2024.
- Methods: DDoS attacks, defacements, and database leaks.
- Volume: Over 2,400 attacks in a short period.
🔗 India Today – G20 Cyberattack Report
🇮🇳 Cyber Attacks by India-Linked Hackers on Pakistan
1. SloppyLemming (also known as Outrider Tiger)
- Targets: Pakistani law enforcement, energy, and defense departments.
- Tools Used: Cobalt Strike, Sliver (post-exploitation frameworks).
- Infrastructure: Cloud-based attacks, extensive reconnaissance.
🔗 SecurityWeek
2. PatchWork (White Elephant)
- Known For: Targeting Pakistan and China through malware-laden documents.
- Focus: Government and military espionage, research theft.
- Tactics: Social engineering, custom malware, OSINT integration.
🔗 Business Recorder
⚠️ Potential Consequences for Both Countries
- Military Escalation: Persistent cyber intrusions could be viewed as acts of war, leading to kinetic responses or cross-border skirmishes.
- Economic Fallout: Attacks on defense and infrastructure systems can cause long-term economic disruption.
- International Isolation: If attacks breach international norms, both countries could face UN scrutiny or sanctions.
- Loss of Public Trust: Citizens may lose faith in government cybersecurity defenses, especially if personal or national data is leaked.
- Diplomatic Breakdown: Cyber warfare adds another layer of complexity to already strained diplomatic relations.
🧠 Conclusion
Cyber conflict is now a key front in India–Pakistan hostilities. While no full-scale cyberwar has broken out, both nations are clearly leveraging state-sponsored or affiliated hacker groups to undermine each other's security and stability.
Would you like this turned into a PDF or formatted for a forum/blog post?