Cyber Espionage Comedy: RATs, Phishing, and Anondoors – Oh My!
The DRAT V2 saga continues as a hacking group with connections beyond Pakistan targets Indian government bodies. With a fresh twist on the RAT malware classic, TAG-140 showcases their evolving playbook. Spoofing the Indian Ministry of Defence, they’re not just playing tag; they’re playing chess with an arsenal of RATs.

Hot Take:
Who knew that cyber espionage could be this melodramatic? It feels like a high-stakes game of digital “Whodunit,” with TAG-140 and its RAT pals playing the role of tech-savvy villains. Clearly, cybercriminals have taken the phrase “sharing is caring” a bit too literally as they pass around their malware like it’s the hot new meme. DRAT V2 might not be the most sophisticated tool in the shed, but with a name like that, it’s definitely got the flair of a cybernetic James Bond.
Key Points:
- TAG-140, linked to the Transparent Tribe, is targeting Indian government organizations using DRAT V2.
- DRAT V2 enhances post-exploitation flexibility but lacks advanced anti-analysis techniques.
- Phishing attacks and spoofed press release portals are key strategies in these cyber campaigns.
- Threat actors are expanding their targets beyond traditional sectors to include railways and oil and gas.
- Recent campaigns include the use of Ares RAT, DISGOMOJI, and Confucius’s WooperStealer.