• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
pakistan origin sidecopy linked to new cyberattack on india's ministry of

Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence

You are here: Home / General Cyber Security News / Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence
March 28, 2023

An sophisticated persistent danger (APT) group that has a monitor record of focusing on India and Afghanistan has been connected to a new phishing marketing campaign that delivers Action RAT.

In accordance to Cyble, which attributed the procedure to SideCopy, the action cluster is made to concentrate on the Defence Investigate and Development Group (DRDO), the study and progress wing of India’s Ministry of Defence.

Recognised for emulating the infection chains linked with SideWinder to deliver its possess malware, SideCopy is a danger team of Pakistani origin that shares overlaps with Clear Tribe. It has been lively due to the fact at minimum 2019.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Attack chains mounted by the team include applying spear-phishing emails to attain original obtain. These messages appear bearing a ZIP archive file that is made up of a Windows shortcut file (.LNK) masquerading as information about the K-4 ballistic missile produced by DRDO.

Executing the .LNK file potential customers to the retrieval of an HTML application from a remote server, which, in turn, shows a decoy presentation, whilst also stealthily deploying the Action RAT backdoor.

The malware, in addition to accumulating info about the victim equipment, is able of working commands sent from a command-and-manage (C2) server, which include harvesting information and dropping comply with-on malware.

Pakistani Hackers

Also deployed is a new details-stealing malware referred to as Vehicle Stealer that is outfitted to get and exfiltrate Microsoft Business information, PDF files, databases and textual content files, and photographs above HTTP or TCP.

“The APT team consistently evolves its strategies even though incorporating new applications into its arsenal,” Cyble famous.

WEBINARDiscover the Concealed Risks of 3rd-Party SaaS Apps

Are you conscious of the pitfalls associated with 3rd-party app accessibility to your company’s SaaS applications? Join our webinar to master about the sorts of permissions being granted and how to lessen risk.

RESERVE YOUR SEAT

This is not the initially time SideCopy has employed Action RAT in its attacks directed in opposition to India. In December 2021, Malwarebytes disclosed a established of intrusions that breached a variety of ministries in Afghanistan and a shared governing administration computer system in India to steal delicate qualifications.

The most current results arrive a thirty day period right after the adversarial crew was noticed targeting Indian government businesses with a remote access trojan dubbed ReverseRAT.

Identified this post interesting? Stick to us on Twitter  and LinkedIn to go through far more special content material we publish.


Some components of this post are sourced from:
thehackernews.com

Previous Post: «icedid malware shifts focus from banking fraud to ransomware delivery IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery
Next Post: France Bans TikTok, Other ‘Fun’ Apps From Government Devices Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Microsoft Uncovers Banking AitM Phishing and BEC Attacks Targeting Financial Giants
  • University of Manchester Suffers Suspected Data Breach During Cyber Incident
  • Asylum Ambuscade: A Cybercrime Group with Espionage Ambitions
  • Barracuda Urges Swift Replacement of Vulnerable ESG Appliances
  • Google Launches Framework to Secure Generative AI
  • 5 Reasons Why Access Management is the Key to Securing the Modern Workplace
  • Security Experts Highlight Exploit for Patched Windows Flaw
  • Minecraft Users Warned of Malware Targeting Modpacks
  • Organizations Urged to Address Critical Vulnerabilities Found in First Half of 2023
  • Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.