SV // CW-U #01

Ep. 01: Initial Access
Pakistan's Lies, Leaks, and Losses during Operation Sindoor

Cyber Warfare: Unattributed
ReleasedApril 2026
Runtime~45 min
TopicAPT36 / Operation Sindoor / Information Warfare
Download PDF
// Episode Summary
// The Pre-Compilation: Malware Was Ready Before the Bullets

On April 21, 2025, somewhere in Pakistan, someone compiled a piece of malware called Crimson RAT. A Remote Access Trojan. Software that, once it lands on a machine, hands the attacker full remote control. Files, keystrokes, camera, microphone. Everything.

Twenty-four hours later, twenty-six civilians were murdered in Pahalgam, Kashmir, in broad daylight. Within days, Indian defence personnel and serving officers in the Jammu and Kashmir region started receiving a phishing PDF titled “Pahalgam Terror Attack” with that same Crimson RAT embedded inside.

The Timestamp
// Timeline of Events
Apr 21, 2025
Crimson RAT compiled in Pakistan. PE header timestamp recovered by Seqrite Labs.
Apr 22, 2025
Pahalgam terror attack. 26 civilians murdered in Kashmir.
Apr 22–24
Phishing wave begins. “Pahalgam Terror Attack.pdf” delivered to Indian defence personnel, police officers, and government staff.
May 7, 2025
Operation Sindoor launched. Indian precision strikes on terror infrastructure across the border.
May 7–10
Cyber retaliation surge. Pakistani hacktivist groups launch coordinated DDoS, defacements, and fake breach claims.
May 13, 2025
1.5 million attack attempts confirmed by Maharashtra Cyber. Only 150 landed.
Apr 9, 2026
Gen. Dwivedi at Ran Samwad 2026 confirms 15% of operational effort during Sindoor went into countering disinformation.
// 01  —  APT36: A Decade of Failing to Hack India

Before looking at what happened during Operation Sindoor, it is worth understanding who Pakistan is actually fielding in cyberspace. The answer is both more sophisticated than most people credit, and yet far less capable than they claim to be.

The Budget Constraint
APT36
Also known as Transparent Tribe. Pakistan's primary cyber espionage unit. Active since at least 2013. Over a decade of targeting India with a mostly unsuccessful track record.
Primary Method
Phishing, and at times spearphishing. Spearphishing is the advanced version: not mass spamming of emails, but carefully crafted, customised payloads sent to specific Indian government officials, defence personnel, and diplomats. The emails look like the files you would receive at work. The attachments look legitimate. Open one, and the malware is planted.
Primary Weapon
Crimson RAT. A .NET-based Remote Access Trojan. Once planted, it grants the attacker full remote control. File exfiltration, keylogging, webcam access, command execution. The victim sees nothing.
Objective
This is not about money. APT36 targets defence and government personnel for intelligence. Classified documents, operational plans, internal communications. State-sponsored espionage.
SideCopy: The Second Pakistan-Linked Group
Gopher Strike and Sheet Attack (2025 / 2026)
// 02  —  Operation Sindoor and Pakistan's Claim Factory

Between April 22 and May 10, 2025, Pakistani hacktivist groups launched a coordinated campaign against Indian infrastructure. Over 480 confirmed cyber incidents in under three weeks. CybelAngel, Sep 2025

1.5M+ Attack attempts on India PTI / Maharashtra Cyber
150 Actually successful PTI, May 13 2025
0.01% Adversary success rate Calculated
<5 min Avg DDoS downtime CloudSEK, May 2025
0 Critical systems breached CERT-In / MoP India
// Attempted vs Successful Attacks  —  Operation Sindoor Window
Attempts1,500,000
Successful150  (0.01%)
Critical systems breached0
Source: PTI / Maharashtra Cyber / CloudSEK (May 2025)
What is a DDoS Attack?
Claim Debunked: Pakistan “Took Down” India's Power Grid
Pakistan Claimed
  • Pakistani cyber wing paralysed approximately 70 percent of India's power grid.
  • 4,600+ power feeders offline in Maharashtra, 3,600+ in Uttar Pradesh, 600+ in Jammu and Kashmir.
  • AI-powered servers at Punjab load dispatch centre disabled.
  • 235+ solar and wind stations in Karnataka knocked offline.
Telegram channels / Pakistan-aligned media, May 2025
Reality
  • India's Ministry of Power and PGCIL (Power Grid Corporation of India Limited), the central transmission utility, confirmed zero disruption to grid operations at any point. PGCIL / Ministry of Power
  • Not a single OSINT channel or media house reported any blackouts across India during this period. Not a single India-based social media account mentioned any blackouts.
  • Not a single anomaly was recorded by third-party monitors like NetBlocks, Cloudflare Radar, or ESET.
  • BSE and NSE, India's two major stock exchanges, restricted overseas web access as a proactive DDoS defence measure. Without overseas internet access, there was no vector to perform DDoS attacks against them. Economic Times, May 7 2025
Verdict
  • Complete fabrication. A psyop designed for Pakistani domestic consumption, possibly for local politicians to score brownie points, and to muddy international perception of the conflict.
Claim Debunked: “100+ Successful Hacks on Indian Government”
Pakistan Claimed
  • 100+ successful attacks on Indian government sites including PMO, President's Office, CERT-In, National Testing Agency (NTA), and Election Commission.
  • 1 million citizen records exfiltrated from Andhra Pradesh High Court.
  • Election Commission of India database compromised.
Various Pakistan-aligned hacktivist Telegram channels, May 2025
Reality
  • CloudSEK forensic analysis confirmed most DDoS attacks caused under 5 minutes of disruption. PMO and ministry sites stayed operational throughout. CloudSEK, May 2025
  • The Andhra Pradesh High Court “leak” was data originally breached in 2023, repackaged with a fresh date and a sensational headline.
  • The Election Commission “breach” was also 2023 data repackaged. Claim surfaced by Team Ezrael, a group with a documented history of recycling old leaks. This was the second time Pakistan-based hacker groups used Team Ezrael's old dump during Operation Sindoor.
  • CERT-In and NTA websites both confirmed operational with zero outage during the claimed attack windows.
  • Of 1.5 million attempts, 150 landed. That is 0.01 percent. PTI, May 13 2025
Verdict
  • India's cyber defences held completely. The information war was the actual operation. Manufacture the perception of damage regardless of whether damage occurred.
The Fabrication Playbook
Attribution Fog: The False-Flag Routing
// 03  —  India's Cyber Response
// The Receipts Exist
// 04  —  The Information Warfare Gap
The Speed Problem
Gen. Dwivedi at Ran Samwad 2026 (Apr 9, Bengaluru)
Gen. Dwivedi at IIT Madras (Aug 4, 2025)
What's New vs What Already Existed
// 05  —  Strategic Takeaways
What The Evidence Compels
// 06  —  The Scorecard
Episode Recap
Next Ep.

The series continues with a deeper look at the tools and the tradecraft. The malware families, the command-and-control infrastructure, the operational techniques both sides actually used, and how these groups run their operations once they are inside. End of transmission.


// Glossary: Acronyms and Full Forms
// Sources and Further Reading
// Listen and Follow
Spotify Apple Podcasts YouTube

Hosted by Krutik

Produced by SpyVeil