Researchers note uptick in activity from India-based DotNot APT targeting Europe.

DoNot APT, also known as APT-C-35, Mint Tempest, Origami Elephant, SECTOR02, and Viceroy Tiger, has demonstrated a notable uptick in activity in recent months. Multiple cybersecurity reports published in June and July 2025 confirm a series of sophisticated campaigns targeting European foreign ministries and diplomatic entities, marking a significant escalation in both scope and frequency

DoNot APT—also known as APT-C-35, Mint Tempest, Origami Elephant, SECTOR02, and Viceroy Tiger—is a sophisticated advanced persistent threat (APT) group believed to have links to India. Active since at least 2016, the group is known for targeting:

  • Government entities
  • Foreign ministries
  • Defense organizations
  • NGOs

Their operations have traditionally focused on South Asia, but recent campaigns show a clear expansion into Europe, especially targeting diplomatic and governmental sectors.

Recent Campaigns Against European Foreign Ministries

Attack Vector

  • Spear-phishing emails: The group uses highly targeted phishing campaigns, often impersonating defense officials and referencing diplomatic activities to appear legitimate.
  • Malicious attachments: Emails contain links to Google Drive hosting password-protected RAR archives.
  • Payload delivery: The archive includes a disguised executable (e.g., notflog.exe with a PDF icon) designed to trick recipients into launching the malware.

Infection Chain

  1. Victim receives a spear-phishing email—often crafted with attention to detail, including correct formatting and special characters to increase credibility.
  2. Clicking the link—downloads a malicious RAR archive from Google Drive.
  3. Execution of disguised executable—runs a batch file, establishes persistence via scheduled tasks (e.g., “PerformTaskMaintain”).
  4. Malware deployment—installs the LoptikMod malware, which connects to a command-and-control (C2) server for further instructions.

LoptikMod Malware

LoptikMod is a custom remote access trojan (RAT) used exclusively by DoNot APT since at least 2018. Key features include:

  • Persistence mechanisms: Scheduled tasks ensure the malware remains active on infected systems.
  • Data exfiltration: Capable of harvesting system information, user credentials, installed software details, and more.
  • Command execution: Receives commands from C2 servers to download additional payloads or perform further malicious actions.
  • Obfuscation techniques: Uses binary string encoding and anti-virtualization checks to evade detection and hinder analysis.
  • Single-instance enforcement: Ensures only one copy runs at a time to avoid interference and detection.

Attribution and Motive

  • Attribution: Multiple cybersecurity firms have linked DoNot APT to Indian interests based on malware code, targeting patterns, and infrastructure.
  • Motivation: The group’s campaigns are believed to be driven by geopolitical intelligence gathering, focusing on sensitive political, military, and economic information relevant to South Asian and increasingly European affairs.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply