Cyber Espionage Hits India: BOSS Linux Users Targeted by UTA0137

In the constantly evolving landscape of cybersecurity, a new menace has surfaced. A sophisticated cyber espionage campaign is unraveling within the borders of India, specifically targeting users of the BOSS Linux distribution, a variant favored by many government sectors. The orchestrator of these advanced attacks is UTA0137, a suspected Pakistan-based threat group with a track record of targeted espionage. These adversaries are not just exploiting any vulnerability—they’ve locked onto the DirtyPipe flaw, known as CVE-2022-0847, demonstrating both deep technical acumen and a strategic choice in their focus on government-associated infrastructure.

Unveiling the Malware Arsenal

The malware leveraged in this complex operation, identified by researchers as DISGOMOJI, is a testament to the threat group’s ingenuity. This custom Linux malware uses the Discord platform, ubiquitous among gamers and tech enthusiasts, for its command and control operations. However, it’s not using the platform in any conventional sense. Instead, DISGOMOJI operates through an emoji-based protocol, a novel approach that adds a layer of obfuscation to its sinister activities. The technical prowess of this malware doesn’t stop there. It exhibits capabilities like harvesting system details, establishing persistence through cron jobs, and the potential to extract data from USB devices—a suite of features enabling comprehensive espionage.

Distributed through documents masquerading as PDF files, the true nature of these documents is far from harmless. They serve as a conduit for the stealthy installation of DISGOMOJI from remote servers. The use of UPX-packed Golang executables enhances the malware’s stealth quotient. These executables fetch additional malware components under the radar, making detection and analysis all the more challenging for cybersecurity defenses.

Stealth and Subterfuge: The Attackers’ Toolbox

In the dynamic realm of cybersecurity, a menacing new threat has emerged. Within India’s digital boundaries, a sophisticated cyber espionage effort is unfolding, predominantly targeting users of the BOSS Linux distribution, a system widely used by Indian government sectors for its reliability and security. The orchestrator of these elaborate cyber incursions is UTA0137, a group likely rooted in Pakistan, notorious for its focus on espionage with specific targets. These assailants have deliberately exploited the DirtyPipe vulnerability, officially cataloged as CVE-2022-0847. Their choice of target is not random; they are adept in their technical skills and strategic in their intent, aiming to infiltrate government-linked entities. The gravity of this situation underscores the rising need for vigilant cybersecurity measures to protect crucial government infrastructure from such stealthy and calculated attacks.

Explore more

Why Are UK Red Teamers Skeptical of AI in Cybersecurity?

In the rapidly evolving landscape of cybersecurity, artificial intelligence (AI) has been heralded as a game-changer, promising to revolutionize how threats are identified and countered. Yet, a recent study commissioned by the Department for Science, Innovation and Technology (DSIT) in late 2024 reveals a surprising undercurrent of doubt among UK red team specialists. These professionals, tasked with simulating cyberattacks to

Edge AI Decentralization – Review

Imagine a world where sensitive data, such as a patient’s medical records, never leaves the hospital’s local systems, yet still benefits from cutting-edge artificial intelligence analysis, making privacy and efficiency a reality. This scenario is no longer a distant dream but a tangible reality thanks to Edge AI decentralization. As data privacy concerns mount and the demand for real-time processing

What Are the Top Data Science Careers to Watch in 2025?

Introduction Imagine a world where every business decision, from predicting customer preferences to detecting financial fraud, hinges on the power of data. In 2025, this is not a distant vision but the reality shaping industries globally, with data science at the heart of this transformation. The field has become a cornerstone of innovation, driving efficiency and strategic growth across sectors

Cisco’s Bold Move into AI and Data Center Innovation

Introduction Imagine a world where artificial intelligence transforms the backbone of every enterprise, powering unprecedented efficiency, yet many businesses hesitate at the threshold of adoption due to rapid technological shifts. This scenario captures the current landscape of technology, where companies like Cisco are stepping up to bridge the gap between innovation and practical implementation. The significance of AI and data

Reclaiming Marketing Relevance in an AI-Driven, Buyer-Led Era

In the dynamic arena of 2025, marketing faces a seismic shift as artificial intelligence (AI) permeates every corner of the tech stack, while buyers assert unprecedented control over their purchasing journeys. A staggering statistic sets the stage: over 80% of software vendors now integrate generative AI, flooding the market with automated tools that often miss the mark on relevance. This