What happened
Cybersecurity researchers have uncovered a campaign by the Pakistan-aligned threat actor Transparent Tribe (APT36) that uses AI-assisted coding tools to generate large volumes of malware implants aimed at Indian targets. The campaign focuses on producing numerous “disposable” malware binaries built in lesser-known programming languages such as Nim, Zig, and Crystal, making detection more difficult.
Researchers say the attackers are effectively “industrializing” malware development with AI, enabling them to flood target environments with multiple variants. The malware infrastructure also leverages legitimate services, including Slack, Discord, Supabase, and Google Sheets, to blend in with normal network activity and evade security monitoring.
Who is affected
The campaign primarily targets Indian government organizations and related sectors in what appears to be a cyber-espionage effort. Transparent Tribe has historically focused on government, military, and diplomatic entities across South Asia.
Why CISOs should care
This campaign highlights a growing trend: attackers are using AI tools to accelerate malware development and scale attacks quickly. Instead of relying on a single sophisticated payload, threat actors can now deploy many slightly different malware variants, overwhelming traditional signature-based detection systems.
For security leaders, this shift means defenses must adapt to faster attack cycles, more polymorphic malware, and abuse of legitimate SaaS services as command-and-control channels.
3 practical actions
- Strengthen behavioral detection by deploying EDR/XDR tools capable of identifying anomalous behavior rather than relying solely on malware signatures.
- Monitor legitimate SaaS usage (e.g., Slack, Discord, cloud APIs) for suspicious connections that could be used for command-and-control activity.
- Harden phishing defenses and employee awareness since social engineering remains a common entry point for espionage campaigns.
