Transparent Tribe, an advanced persistent threat (APT) actor based in Pakistan, pretended to be an Indian government organization in order deliver the Poseidon Linux backdoor. Tejaswini Sandapolla, a security researcher at Uptycs, stated that “Poseidon is a second-stage payload malware connected to Transparent Tribe.” in an expert study released last week. It is a general-purpose backdoor that gives attackers a variety of tools to take control of an infected host. Its features include keystroke recording, screen grabs, file uploads and downloads, and different forms of remote system administration. Transparent Tribe has a history of attacking Indian government organizations, military personnel, defense contractors, and educational institutions. It is also known as APT36, Operation C-Major, PROJECTM, and Mythic Leopard. It has also frequently used trojanized versions of Kavach, the 2FA software that the Indian government requires, to spread a range of viruses including CrimsonRAT and LimePad to gather important data. Late last year, another phishing attempt was discovered that used weaponized attachments to download malware intended to steal