All cases

India–Pakistan Cyber Operations

2016 – 2019 (multiple incidents)

EspionagePeak: IntrusionAttribution: Moderate ConfidenceGovernmentDefenseMedia
Year
2018
Actor country
India / Pakistan (reciprocal)
Target regions
India, Pakistan
Unpeace score
5

Executive Summary

Reciprocal intrusion campaigns between Indian and Pakistani state-linked actors targeting government, military, and media sectors. The most documented South Asian cyber conflict pattern, involving persistent espionage operations from both sides that intensified during periods of kinetic tension along the Line of Control.

Why This Matters

India-Pakistan cyber operations represent the most documented case of sustained reciprocal cyber espionage between regional nuclear-armed adversaries, demonstrating that cyber conflict dynamics extend well beyond the US-Russia-China axis.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2016
Intrusion

Targeted espionage campaigns

Both sides conducted persistent spearphishing campaigns against military, diplomatic, and government targets using custom remote access trojans.

2019
Intrusion

Intensification during tensions

Cyber operations escalated during the 2016 Uri attack aftermath and 2019 Balakot crisis, with both sides increasing targeting of military and intelligence organizations.

Threshold Crossings

  • Most sustained reciprocal cyber espionage campaign between nuclear-armed adversaries in South Asia
  • Demonstrated that cyber operations track kinetic tension cycles in regional conflicts

Restraint Factors

  • Operations remained within espionage parameters — no destructive payloads documented
  • Both sides maintained deniability through proxy groups

Attribution Assessment

Moderate ConfidenceMultiple groups on both sides; Pakistani-linked groups include Transparent Tribe (APT36) and Gorgon Group; Indian-linked groups include SideWinder and Patchwork
India / Pakistan (reciprocal)
Transparent TribeAPT36SideWinderPatchworkGorgon Group
1. Technical

Threat actor mapped to India / Pakistan (reciprocal) based on infrastructure analysis, malware attribution, and operational patterns.

Evidence: Recorded Future: Pakistan-Linked Cyber Threats to Indian Targets; Kaspersky: Transparent Tribe Campaign Analysis

2. Political / Legal
No formal state response
  • No formal attribution statements from either government
  • Private sector threat intelligence provided primary public documentation
3. Open Source

No dedicated journalistic sources in dataset. See sources section for full references.

Moderate Confidence” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

5

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak2/6
Threshold crossings2/4
Governance flags1/8
Sectors affected3/6
Entanglement6/10
Country scope2/6

Coercive Function

Espionage

Intelligence collection — coercive value lies in the information advantage gained and the implicit signal that the adversary can access sensitive systems.

Observed coercive effects

  • Most sustained reciprocal cyber espionage campaign between nuclear-armed adversaries in South Asia
  • Demonstrated that cyber operations track kinetic tension cycles in regional conflicts

Entanglement Risk

Entanglement score6

Sectors affected

GovernmentDefenseMedia

Countries / regions

IndiaPakistan

Impact summary

Sustained bilateral espionage affecting military and government targets; scope of intelligence loss not publicly assessed.

Infrastructure Meaning

Malware / tooling

CrimsonRATPeppy RATRazor RAT

Capability profile

Sustained bilateral espionage affecting military and government targets; scope of intelligence loss not publicly assessed.

3 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • Responsible state behavior in ICT use (UN OEWG)
  • Restraint in cyber operations between nuclear-armed states

Policy responses

  • No formal attribution statements from either government
  • Private sector threat intelligence provided primary public documentation

Regulatory changes

  • India accelerated national cybersecurity strategy and CERT-In strengthening
  • Pakistan established National Centre for Cyber Security

Governance impact assessment

Illustrated how bilateral cyber espionage operates as a persistent feature of South Asian strategic competition, highlighting the absence of regional cyber confidence-building measures between nuclear-armed adversaries.

Sources

V

Recorded Future: Pakistan-Linked Cyber Threats to Indian Targets

Vendor Report2019-06
V

Kaspersky: Transparent Tribe Campaign Analysis

Vendor Report2020-06

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.