Sindoor Dropper Malware Targets Linux Systems Using Weaponized .desktop Files
A new malware campaign called “Sindoor Dropper” is targeting Linux systems using spear-phishing tactics tied to the India-Pakistan conflict theme. It spreads via malicious .desktop files disguised as PDF documents, which open a decoy PDF while silently launching a complex, multi-stage infection.


The malware chain includes an AES decryptor and encrypted downloader, using obfuscation and anti-virtual machine checks to evade detection. The final payload is a modified MeshAgent remote administration tool that connects to a command-and-control server, giving attackers full remote access to compromised Linux machines.


This campaign marks a shift toward targeting Linux environments with sophisticated phishing and malware techniques.
NPAV offers a robust solution to combat cyber fraud. Protect yourself with our top-tier security product, Z Plus Security
- Other (43)
- Ransomware (179)
- Events and News (28)
- Features (45)
- Security (504)
- Tips (83)
- Google (44)
- Achievements (13)
- Products (37)
- Activation (7)
- Dealers (1)
- Bank Phishing (59)
- Malware Alerts (295)
- Cyber Attack (381)
- Data Backup (15)
- Data Breach (226)
- Phishing (191)
- Securty Tips (9)
- Browser Hijack (30)
- Adware (15)
- Email And Password (90)
- Android Security (96)
- Knoweldgebase (37)
- Botnet (20)
- Updates (11)
- Alert (72)
- Hacking (87)
- Social Media (11)
- vulnerability (128)
- Hacker (103)
- Spyware (18)
- Windows (25)
- Microsoft (44)
- Uber (1)
- YouTube (4)
- Trojan (7)
- Website hacks (17)
- Paytm (1)
- Credit card scam (4)
- Telegram (8)
- RAT (12)
- Bug (4)
- Twitter (3)
- Facebook (13)
- Banking Trojan (16)
- Mozilla (2)
- COVID-19 (5)
- Instagram (5)
- NPAV Announcement (18)
- IoT Security (4)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- Amazon (5)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (4)
- Cloud malware (4)
- Cloud storage (2)
- Financial fraud (112)
- Impersonation phishing (2)
- DDoS (12)
- Smishing (2)
- Whale (0)
- Whale phishing (5)
- WINRAR (3)
- ZIP (2)
- Fraud Protector (99)
-
Mobile Frauds
(78)
- WhatsApp (20)
- AI (38)