• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

TidePool malware targets Indian personnel worldwide

By Guest Authors

If you are a personnel at any Indian embassy across the world, you should be cautious when surfing the Internet after the discovery of a new family of malware called TidePool that security researchers at Palo Alto Networks believe is an evolutionary product of the old Operation Ke3chang.

At the moment, it is hard to conclude with finality that TidePool is a direct descendant of Operation Ke3chang, but researchers have found key evidence that points to the relation of TidePool to Ke3chang based on the malware’s behavior. One particular piece of indication that Ke3chang is tied to TidePool is the target: Ke3chang previously was used to launch a cyber attack against the Ministry of Affairs of India following still recent attacks against the nation’s government.

india-hack

According to Palo Alto Networks, the attackers behind TidePool have been using spear phishing email campaigns to hit a number of Indian embassies across the globe. The emails purport to contain an annual report filed by the employees at more than 30 embassies of India from different countries.

The attackers are also using email addresses that appear to belong to legitimate people who have connections with the Indian embassies so that the spear phishing emails look authentic as though they were sent by the legitimate sources. Once the Indian embassy recipients perceive an email to be legit, they are more likely to open the message than ignore it.

Palo Alto Networks’ researchers also reported that the attackers are taking advantage of a new hole in executing their attacks using TidePool. The new vulnerability allows for a couple of changes in a computer’s registry and a surge in a network’s command and control traffic due to what the researchers say as an evolution in the codebase of Ke3chang into TidePool.

The Ke3chang vulnerability saw the light of day in September 2015 that also contained malicious document. But in contrast to Ke3chang, the TidePool exploit carrier document is sent as an MHTML document that comes in the form of a Microsoft Word file. The TidePool malware family is designed to let attackers through the firewall and view and change files and folders.

TidePool also proceeds to steal information pertaining to the computer and transmits the data to a remote Command and Control server through a connection that is closely tied to a malware family employed by the authors of the Ke3chang malware.

What’s most striking about this malware is that there seems to be little attention given to it by most security vendors, except Palo Alto Networks, of course. Now that it appears to be persistent in its attacks, it is high time that the IT departments raised their alarm.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

TourBox Elite Plus Review – Streamline Creative Workflows on iPad and Mac

Retevis MateTalk C3 and C4 Review: A New Generation of GMRS Radios

OpenRock Link 20 Review: Comfort and Clarity in an Open-Ear Design

Mudita Kompakt E-Ink Phone Review: A Phone That Lets You Disconnect

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • TourBox Elite Plus Review – Streamline Creative Workflows on iPad and Mac
  • Retevis MateTalk C3 and C4 Review: A New Generation of GMRS Radios
  • Seedpace Interactive Player with Craft Review: A Screen-Free Storytelling Experience
  • Audioengine HD4 Next Gen Review – The Perfect Bookshelf Speakers for Your Computer Setup

Copyright © 2025 · All Rights Reserved