Election Bait Spear Phishing Targeting Govt

Verdict: Suspicious | Risk Score: 9/10 | Severity: critical

Category: KYC, Phishing

How Election Bait Spear Phishing Targeting Govt Works

Overview: In recent years, cybercriminals have increasingly targeted Indian government officials and employees with spear phishing scams designed to steal sensitive information, especially around major events like elections. These scams are dangerous because attackers pose as official sources and trick victims into opening malicious documents, putting critical data—and even national security—at risk. How It Works: Attackers craft emails that appear to come from government address[ADDRESS_REDACTED]. The message typically references timely events, such as presidential elections or major awards, to create urgency and credibility. The email contains a Microsoft Office attachment (.docm or .xlam). When victims open the file and enable macros, hidden scripts quietly install a Remote Access Trojan (RAT) like CrimsonRAT, enabling the attacker to steal files, monitor activity, and maintain silent access. India Angle: These attacks are tailored for Indian contexts, using references to the President’s awards, defense briefings, or monthly reports. The emails spoof popular government domains (for example, using “goi[dot]in” variants), and target officials in ministries, municipalities, and defense agencies. The scam has been observed especially during election periods and award cycles, with North and Central India most frequently targeted. Real Examples: - “Dear Sir/Madam, please see attached the final list of awardees for President’s Honour. Open the file and enable editing to review.” - “Monthly Report MAP.xlam attached for your urgent review by order of the Director, Government of India.” Red Flags: - Unsolicited government emails asking you to open Office attachments and enable macros. - Poorly-worded messages with urgent, official-sounding instructions. - Sender address[ADDRESS_REDACTED]. - Attachments with file extensions like .docm or .xlam instead of standard .doc or .xls. - References to current news or events not relevant to your role. Protective Measures: - Never enable macros on files received unexpectedly, especially from outside your organisation. - Cross-check any official-looking email by calling your department’s official number, not the number in the email. - If in doubt, forward suspicious messages to your IT/security team for review. - Keep your anti-virus and Office applications updated. If Victimised: - Disconnect the affected computer from the internet. - Report immediately to your IT team, call 1930, and file a complaint at cybercrime.gov.in. - Government employees must comply with CERT-In’s 6-hour breach reporting requirement to avoid penalties. - Inform your reporting officer and cooperate with any investigation. Related Scams: - Fake IRCTC/KYC update emails targeting government addresses. - Army recruitment scam emails with malware-laced attachments. - State award scam messages coinciding with state-level events.

Visual Intelligence:

BharatSecure's AI has identified this as a used in scams targeting Indian users.

Who Does Election Bait Spear Phishing Targeting Govt Target?

General public across India

Red Flags — How to Identify Election Bait Spear Phishing Targeting Govt

  • Unsolicited emails with urgent official government references
  • Attachments ending with .docm or .xlam urging macro enablement
  • Sender email is nearly—but not exactly—government domain
  • Requests referencing current elections or award lists
  • Unusual tone or grammar errors in claimed official communication

What To Do If You Encounter Election Bait Spear Phishing Targeting Govt

  1. Do not click any links or share personal information
  2. Block and report the sender immediately
  3. Report at cybercrime.gov.in or call 1930
  4. Inform your bank if financial details were shared

How to Report Election Bait Spear Phishing Targeting Govt in India

  • Call 1930 — National Cyber Crime Helpline (24x7)
  • File a complaint at cybercrime.gov.in
  • Contact your bank immediately if money was lost
  • Call RBI helpline: 14440 for banking fraud

Frequently Asked Questions

What is Election Bait Spear Phishing Targeting Govt?
Overview: In recent years, cybercriminals have increasingly targeted Indian government officials and employees with spear phishing scams designed to steal sensitive information, especially around major events like elections. These scams are dangerous because attackers pose as official sources and trick victims into opening malicious documents, putting critical data—and even national security—at risk. How It Works: Attackers craft emails that appear to come from government address[ADDRESS_REDACT
How does Election Bait Spear Phishing Targeting Govt work?
Overview: In recent years, cybercriminals have increasingly targeted Indian government officials and employees with spear phishing scams designed to steal sensitive information, especially around major events like elections. These scams are dangerous because attackers pose as official sources and trick victims into opening malicious documents, putting critical data—and even national security—at ri
How to protect yourself from Election Bait Spear Phishing Targeting Govt?
Do not click any links or share personal information Block and report the sender immediately Report at cybercrime.gov.in or call 1930 Inform your bank if financial details were shared
How to report Election Bait Spear Phishing Targeting Govt in India?
Report to cybercrime.gov.in or call 1930 (National Cyber Crime Helpline). You can also contact your local police station's cyber cell.

Verify Any Suspicious Message

Check any suspicious message, link, or call for free at bharatsecure.app. BharatSecure uses AI to detect scams in real-time and protect Indian users.