Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » SideWinder APT strikes Middle East and Africa with stealthy multi-stage attack
Global Security

SideWinder APT strikes Middle East and Africa with stealthy multi-stage attack

AdminBy AdminOctober 17, 2024No Comments4 Mins Read
Multi-Stage Attack
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


A multi-stage attack

An Advanced Persistent Threat Entity (APT), believed to have links to India, has carried out a flurry of attacks against prominent organizations and strategic infrastructure in the Middle East and Africa.

The activity was assigned to a group tracked as SideWinderwhich is also known as APT-C-17, Baby Elephant, Hardcore Nationalist, Leafperforator, Rattlesnake, Razor Tiger and T-APT-04.

“The group may be perceived as a low-level actor due to the use of public exploits, malware and LNK scripts as infection vectors, as well as the use of public RATs, but their true capabilities only become apparent when you closely examine the details of their operation,” researchers Kaspersky Giampaolo Dedola and Vasyl Berdnikov said.

The targets of the attacks are government and military structures, logistics, infrastructure and telecommunications companies, financial institutions, universities and oil trading companies located in Bangladesh, Djibouti, Jordan, Malaysia, Maldives, Myanmar, Nepal, Pakistan, Saudi Arabia, Sri- Lanka, Turkey and UAE

SideWinder has also been seen targeting diplomatic facilities in Afghanistan, France, China, India, Indonesia and Morocco.

Cyber ​​security

The most important aspect of the recent campaign is the use of a multistage infection chain to deliver a previously unknown post-exploitation toolkit called StealerBot.

It all starts with a phishing email with an attachment – either a ZIP archive containing a Windows Shortcut (LNK) file or a Microsoft Office document – which in turn executes a series of JavaScript and .NET intermediate loaders to finally deploy the StealerBot malware.

The documents rely on a tried-and-tested remote injection pattern technique to download an RTF file stored on a remote server controlled by an adversary. The RTF file, on the other hand, launches an exploit for the CVE-2017-11882to execute the JavaScript code responsible for running the additional JavaScript code located at mofa-gov-sa.direct888(.)net.

On the other hand, the LNK file uses mshta.exe utility, a native Windows binary designed to execute Microsoft HTML Application (HTA) files to run the same JavaScript code hosted on a malicious website controlled by an attacker.

The JavaScript malware is used to extract an embedded string in a Base64-encoded .NET library named “App.dll” that collects system information and functions as a loader for a second .NET payload from the server (“ModuleInstaller.dll”).

ModuleInstaller is also a loader, but it is equipped to maintain persistence on the host, execute the module backdoor loader, and retrieve the next-stage components. But in an interesting twist, the way they run is determined by which endpoint security solution is installed on the host.

“The Bbckdoor bootloader module has been observed since 2020,” the researchers said, pointing to its ability to evade detection and avoid sandboxing. “It’s stayed pretty much the same for years.”

A multi-stage attack

“It was recently updated by an attacker, but the main difference is that the older versions are configured to download an encrypted file using a specific file name built into the program, while the latest versions were designed to list all files in the current directory and download those without an extension.”

The ultimate goal of the attacks is to remove StealerBot via a backdoor download module. Described as an “advanced modular implant” based on .NET, it is specifically designed to facilitate espionage by providing multiple plugins to –

  • Install additional malware using a C++ downloader
  • Take screenshots
  • Record keystrokes
  • Steal passwords from browsers
  • RDP credential interception
  • Steal files
  • Start a reverse shell
  • Phish windows credentials and
  • Elevation of privileges to bypass User Account Control (UAC)

“The implant consists of various modules loaded by a master ‘Orchestrator’ that is responsible for communicating with (command and control) and executing and managing the plug-ins,” the researchers said. “Orchestrator is normally loaded by the backdoor loader module.”

Cyber ​​security

Kaspersky said it discovered two installer components – InstallerPayload and InstallerPayload_NET – that are not part of the attack chain, but are used to install StealerBot, possibly to update a new version or infect another user.

SideWinder’s geographic expansion and use of a sophisticated new toolset comes as cybersecurity firm Cyfirma detailed a new infrastructure powered by A mythical structure after exploitation and associated with Transparent tribe (aka APT36), a threat actor believed to originate from Pakistan.

“The group distributes Linux desktop malware disguised as PDF files,” the report said said. “These files execute scripts to download and run malicious binaries from remote servers, establishing persistent access and avoiding detection.”

“APT36 is increasingly targeting Linux environments due to their widespread use in Indian public sectors, especially with the Debian-based BOSS OS and the emergence of My OS.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.