Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs
Global Security

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

AdminBy AdminMay 20, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 20, 2025Red LakshmananMalicious software / cyber -beno

High-level state institutions in Sri Lanka, Bangladesh and Pakistan have been the goal of a new company organized by an actor threatened as a Sidgeinder.

“The attackers used phishing -electronic letters paired with a useful load of Geofed to ensure that only victims in certain countries have received malicious content,” – researchers of Acronis Santogo Pontiroli, Jozsef Gegeny and Prakas Thevendaran – Note In a report that shared with Hacker News.

Attack networks use speech-fitting calls as a starting point to activate the infection and deployment of well-known malware, called as theft. It is worth noting that Modus Operandi matches recent sidewalls documented Caspersorski in March 2025.

Cybersecurity

Some of the goals of the company, on Acronis, include a commission for regulating the Bangladesh, the Ministry of Defense and the Ministry of Finance; Pakistan Directorate for Indigenous Technical Development; and the Sri Lanka, the Ministry of Finance, the Ministry of Defense and the Central Bank.

Attacks are characterized by the use of perennial drawbacks of remote code in Microsoft Office (Cve-2017-0199 and Cve-2017-1188) as the initial vectors for the deployment of malware capable of maintaining sustainable access in state conditions in South Asia.

The malicious documents when opening cause a feat for CVE-2017-0199 to deliver the useful load to the next stage responsible for installing Cteelerbot by using DLL download methods.

One of the characteristic tactics taken by the Boadkinder is that the e -mails with speakers are combined with a useful load to ensure that only victims that meet the criteria are malicious content. In case the IP IP is not the same, an empty RTF file is sent instead of the bait.

A malicious useful load-is the RTF file, which is armed with the CVE-2017-11882, a vulnerability of memory corruption in the Equity Editor, to launch a sherverbot-based Shercode loader.

Cybersecurity

According to Kaspersky, theft .NET implant This is designed to give up additional malware, run a backward shell and collect a wide range of data from disturbed hosts, including screenshots, pressing, passwords and files.

“Sidewinder has demonstrated consistent activity over time, maintaining a sustainable pace of operations without prolonged inaction – a model that reflects organizational continuity and sustainable intention,” the researchers said.

“More attentive analysis of their tactics, methods and procedures (TTPS) shows a high degree of control and accuracy, ensuring that the harmful useful loads will only be set for carefully selected purposes and often only for a limited time.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.