APT Hackers
APT Hackers
Document Control
Pakistan APT Hackers Create Weaponized IndiaPost Website to Attack Windows &
Android Users
Document No:
Revision Status:
Effective Date:
Last Review Date:
Approved by
Preparer Name:
Signature
Date:
Table of Contents
1. Introduction
2. Incident Overview
3. Attack Methodology
4. Indicators of Compromise (IoCs)
5. Recommendations
6. Conclusion
7. References
1. Introduction
2. Incident Overview
The malicious website, hosted at postindia[.]site, employs device detection mechanisms to deliver
operating system-specific payloads:
Researchers from Cyfirma identified this campaign in March 2025, linking its origin to Pakistan
through forensic metadata analysis. The attack infrastructure includes IP addresses and domains
crafted to mimic Indian government entities, a known tactic of APT36.
3. Attack Methodology
• The victim is lured to postindia[.]site via phishing emails or social engineering tactics.
• The website detects the visitor’s device type using JavaScript.
• Windows: Users are prompted to download a PDF with “ClickFix” instructions that
execute a PowerShell command, deploying malware.
• Android: Users receive a download prompt for indiapost.apk, which disguises itself as a
Google Accounts app.
• The malicious website uses JavaScript to differentiate between desktop and mobile users.
• Depending on the device type, the user is served either a Windows-based attack vector
(PDF download) or an Android-based malware (APK download).
function detectDevice() {
const isMobile =
/iPhone|iPad|iPod|Android/.test(navigator.userAgent);
if (isMobile) {
dialogTitle.textContent = "Get Our App";
actionButton.href =
"https://postindia.site/download/indiapost.apk";
} else {
dialogTitle.textContent = "Download Tracking Information";
actionButton.href =
"https://drive.usercontent.google.com/download?id=1RSILmV3HDR6APXKWEPX
rg2MRP1d2xwmb&export=download";
}
}
HTML code contains a JavaScript function
• Users are tricked into downloading a malicious PDF containing “ClickFix” instructions.
• The PDF instructs victims to press Win+R and execute a PowerShell command, leading to
malware installation.
• The PowerShell script downloads and executes further payloads to establish persistence
and exfiltrate data.
• postindia[.]site
• email[.]gov[.]in[.]gov-in[.]mywire[.]org
• 88[.]222[.]245[.]211
• indiapost.apk
• PDF file containing PowerShell execution commands
To mitigate risks associated with this attack campaign, organizations should implement the
following security measures:
• Deploy Endpoint Detection and Response (EDR) solutions to detect and block malicious
activity.
• Ensure Windows Defender and third-party AV solutions are updated with the latest
signatures.
6. Conclusion
• Cyber Security News - Computer Security | Hacking News | Cyber Attack News
• Pakistan APT Hackers Create Weaponized IndiaPost Website to Attack Windows &
Android Users