Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»APT36 Abuse Hackers Linux. Files to install malware in new attacks
    Security

    APT36 Abuse Hackers Linux. Files to install malware in new attacks

    PineapplesUpdateBy PineapplesUpdateAugust 22, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    APT36 Abuse Hackers Linux. Files to install malware in new attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    APT36 Abuse Hackers Linux. Files to install malware in new attacks

    Pakistani APT36 Cyberspace is using Linux .desktop files to load malware in new attacks against government and defense institutions in India.

    Documents in the report by activity, Malevolent And CloudsacThe objective is on data exfIs and frequent espionage access. APT is 36 First used .desktop files To load malware in targeted detective operations in South Asia.

    The attacks were first observed on August 1, 2025, and based on the latest evidence, still continue.

    Desktop file abuse

    Although the attacks described in two reports use different infrastructure and samples (based on the hash), technology, strategy and procedures (TTPs), attack chains and clear goals are the same.

    The victims receive the zip archives through the fishing email in which a malicious .desktop file is disguised as a PDF document, and is designated accordingly.

    Linux .desktop files are text-based application launchers that have configuration options that suggest how the desktop environment should be displayed and an application should be run.

    Users open the .desktop file, thinking that it is a PDF, which causes a bash command hidden in the field, “/TMP/’to create a temporary file name in”/TMP/’ where it writes a hex-encoded payload from the attacker’s server or Google Drive.

    Then, it runs ‘CHMOD +X’ to make executable and launch it in the background.

    To reduce doubts for the victim, the script also launched a firefox to display a benign decoy PDF file hosted on Google Drive.

    Sample
    Sample
    Source: Cloudsac

    In addition to the manipulation of the ‘ExEC = “field to run the sequence of the shell command, the attackers added fields like” Terminal = False’ to hide the terminal window from the user, and to run the file on every login, and to run the file on every login.

    A malicious desktop file
    A malicious desktop file
    Source: Cloudsac

    usually.

    However, in APT36 attacks, the attackers essentially misuse this launcher mechanism to convert to a malware dropper and firmness installation system, similarly how ‘LNK’ shortcuts are abused on windows.

    Because .desktop files on Linux are usually lessons, not binergies, and as their misuse is not widely documented, safety equipment on the platform is unlikely to monitor them as potential hazards.

    In this case, the payload dropped by the .desktop file is a cow-based ELF executable that performs detective functions.

    Although packing and obfusation made the analysis challenging, researchers found that it could be determined to stay hidden, or attempts to establish their distinct persistence using Chron Jobs and System Services.

    Communication with C2 is performed through a bi-directional websocket channel, allowing data exfIs and remote command execution.

    Overview of attack
    Overview of attack
    Source: Cloudsac

    Both cyber security firms indicate this latest campaign to develop the strategy of APT36, which are more developed and refined.


    Picus Blue Report 2025

    The passwords broke in 46% of the atmosphere, almost doubled by 25% last year.

    Picus Blue Report 2025 Now get a wider look at more conclusions on prevention, detection and data exfIs.

    abuse APT36 attacks files hackers install Linux Malware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe race to make lunar atomic reactor gets hot
    Next Article No, iPados 26 is not a laptop killer, but these 4 things make it a big leap
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    January 19, 2026
    Startups

    These 7 Linux commands are obsolete so don’t use them – here’s why

    January 14, 2026
    Startups

    I tried the new Linux Mint 22.3 – it’s a masterclass in polish and quality of life improvements

    January 12, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.