Press ESC to close

Beyond the Surface: the evolution and expansion of the SideWinder APT group

CategoryDetails
Threat ActorsSideWinder (also T-APT-04, RattleSnake)
Campaign OverviewProlific APT group active since 2012, targeting military & government entities in South/Southeast Asia, expanding to the Middle East and Africa.
Target Regions (Victims)Pakistan, Sri Lanka, China, Nepal, Middle East, Africa
MethodologySpear-phishing emails with attachments (DOCX, XLSX, ZIP) containing malicious LNK files, exploiting CVE-2017-11882 in RTF files, and using various downloaders and remote template injection.
Product TargetedMicrosoft Office (CVE-2017-11882), .NET applications
Malware ReferenceStealerBot (espionage tool), App.dll (downloader), ModuleInstaller (backdoor loader)
Tools UsedLNK files, JavaScript, .NET, MSHTA.exe, ActiveXObject, App.dll, ModuleInstaller
Vulnerabilities ExploitedCVE-2017-11882 (Microsoft Office RTF vulnerability)
TTPsSpear-phishing, LNK files, RTF exploits, downloader modules, Base64 encoding, XOR encryption, C2 servers
AttributionSideWinder (T-APT-04, RattleSnake)
RecommendationsUse security solutions to detect LNK and RTF file exploits, block untrusted macros, apply security patches, monitor unusual network activity.
SourceSecurelist by Kaspersky

Read full article: https://securelist.com/sidewinder-apt/114089/

The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *