CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence Apr 10, 2026

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators - CyberSecurityNews

CyberSecurityNews Archived Apr 10, 2026 ✓ Full text saved

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators CyberSecurityNews

Full text archived locally
✦ AI Summary · Claude Sonnet


    Home Cyber Security News APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators A significant discovery in threat intelligence reveals that APT-C-35, commonly known as DoNot, continues to maintain an active infrastructure footprint across the internet. Security researchers have identified new infrastructure clusters linked to this India-based threat group, which has long been recognized as a state-sponsored actor with espionage capabilities targeting critical regions in South Asia. APT-C-35 represents a persistent cybersecurity threat to organizations across government, defense, and diplomatic sectors. The group’s operations have remained consistent, with researchers documenting infrastructure activities that show how attackers maintain command-and-control channels while evading traditional detection methods. Recent findings show that the group’s web servers maintain distinct characteristics that can be traced and monitored by security teams. At-Bay analyst and researcher Idan Tarab identified specific technical markers that distinguish APT-C-35 infrastructure from legitimate web servers. These indicators provided the foundation for tracking the group’s recent activities and understanding their operational methods across multiple network segments. Infrastructure Hunting and Detection Methods The investigation employed a structured approach to identify APT-C-35 assets by examining Apache HTTP response characteristics combined with Autonomous System Number (ASN) 399629 analysis. Security researchers discovered that the targeted infrastructure revealed consistent patterns in HTTP responses, including specific header configurations that served as reliable detection signatures. The hunting queries revealed that servers associated with APT-C-35 returned specific Apache HTTP headers, including standardized expiration dates and content-length values. One particular indicator identified HTTP responses with “Expires: Thu, 19 Nov 1981 08:52:00 GMT” paired with “HTTP/1.1 200 OK” status codes across ASN 399629, which significantly narrowed the search scope. Analysis uncovered approximately 73 results representing 36 unique IP addresses within the infrastructure cluster. The primary identified server, gilbertfix.info hosted on IP 149.248.76.43 in Wyoming, showed typical cache control headers including “Cache-Control: no-store, no-cache, must-revalidate” configurations. These defensive measures suggest the infrastructure was designed to prevent caching and secure sensitive communications. The discovery enables security teams to implement proactive threat detection by monitoring for these specific HTTP response patterns. Organizations can now correlate network indicators of compromise with known APT-C-35 infrastructure, accelerating incident response times and improving threat characterization accuracy. This research reinforces the importance of continuous infrastructure hunting in maintaining operational awareness against state-sponsored threat actors. Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google. RELATED ARTICLESMORE FROM AUTHOR Cyber Security News New ClickFix Campaign Uses macOS Script Editor to Deliver Atomic Stealer Cyber Security News Hackers Use ClickFix and Malicious DMG Files to Deliver notnullOSX on macOS Cyber Security News New STX RAT Uses Hidden Remote Desktop and Infostealer Features to Evade Detection Top 10 Top 10 Best User Access Management Tools in 2026 April 4, 2026 Top 10 Best VPN For Chrome in 2026 April 4, 2026 20 Best Application Performance Monitoring Tools in 2026 April 3, 2026 Top 10 Best VPN For Linux In 2026 April 3, 2026 10 Best VPN For Privacy In 2026 April 2, 2026
    💬 Team Notes
    Article Info
    Source
    CyberSecurityNews
    Category
    ◉ Threat Intelligence
    Published
    Apr 10, 2026
    Archived
    Apr 10, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗