Sidewinder APT Group Expands Geographic Reach in Latest Cyberattack Spree

October 16, 2024

The Sidewinder APT group, known to be sponsored by India, has broadened its attack scope, targeting multiple entities across Asia, Africa, the Middle East, and Europe. The group's recent activities reveal the use of a new post-exploit tool, StealerBot, to enhance its cyber-espionage operations.

Sidewinder, active since 2012 and publicized in 2018, has historically attacked adversaries in Pakistan, Afghanistan, China, and Nepal. However, the past six months have seen a significant expansion of its geographic scope. Kaspersky researchers have observed the group's recent attacks and provided insights into some of Sidewinder's post-compromise activities.

The APT group has recently targeted entities in Bangladesh, Djibouti, Jordan, Malaysia, the Maldives, Myanmar, Nepal, Pakistan, Saudi Arabia, Sri Lanka, Turkey, and the UAE. The impacted sectors include government and military entities, logistics, infrastructure and telecommunications companies, financial institutions, universities, and oil trading companies. Diplomatic entities in Afghanistan, France, China, India, Indonesia, and Morocco have also been targeted.

The researchers describe StealerBot as 'an advanced modular implant designed specifically for espionage activities.' The group's attack chain remains consistent, starting with a spear-phishing email with an attachment, usually a Microsoft OOXML document or a .zip archive containing a malicious .lnk file. This initiates a multistage infection chain that ultimately results in the installation of the StealerBot tool.

The spear-phishing emails often contain information from public websites, intended to trick the victim into opening the file. The documents use the remote template injection technique to download an .rtf file stored on a remote server controlled by the attackers. These files exploit the CVE-2017-11882 vulnerability in Microsoft Office software to download further shellcode and malware, ultimately aiming to extract data from infected systems.

StealerBot, developed with .NET, is a modular implant designed for espionage activities. The attack chain loads the malware's components into memory, deploying a Trojan that Sidewinder uses to maintain a foothold on compromised machines. The ModuleInstaller acts as a downloader that deploys the Trojan, while another module, the 'Orchestrator,' communicates with Sidewinder's command-and-control center and manages other malware plugins.

Despite Sidewinder's perceived low-skilled threat group status due to its use of public exploits and remote access Trojans (RATs), the group's true capabilities are evident when examining the details of their operations. The researchers warn potential targets to be alert and aware of the threat posed by the group. They have also provided a comprehensive list of indicators of compromise (IoCs) to help defenders recognize the presence of Sidewinder and StealerBot on their networks.

Related News

Latest News

Like what you see?

Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.

Subscribe Below

By submitting this form, you’re giving us permission to email you. You may unsubscribe at any time.

Accelerate Security Teams

Continuously identify and prioritize the risks that are most critical in your environment, and validate that your remediation efforts are reducing risk. An always-on single source-of-truth of your assets, services, and vulnerabilities.