Press ESC to close

WarHawk: the New Backdoor in the Arsenal of the SideWinder APT Group

CategoryDetails
Threat ActorsSideWinder APT (aka Rattlesnake, T-APT4), suspected Indian group active since 2012.
Campaign OverviewTargeting Pakistan with the WarHawk backdoor, distributing via compromised legitimate servers, and deploying Cobalt Strike payloads.
Target RegionsPakistan (Government and military sectors).
MethodologyISO files containing LNK files, decoy PDFs, and malicious binaries hosted on legitimate compromised websites.
Product TargetedWindows systems.
Malware ReferenceWarHawk Backdoor (newly discovered), RtlAudioDriver.exe (older version), MsBuild.exe (newer version).
Tools UsedWarHawk Backdoor modules, Cobalt Strike, custom Cobalt Strike loader using KernelCallBackTable Injection.
Vulnerabilities ExploitedCompromised legitimate websites to host malware (e.g., “nepra.org.pk”).
TTPs– KernelCallBackTable Injection
– Time zone validation (Pakistan Standard Time)
– Use of decoy PDFs to distract victims
– Modular malware functionality: Download & Execute, Command Execution, File Management, and Exfiltration modules.
AttributionNetwork infrastructure reuse linked to SideWinder APT.
Recommendations– Monitor for suspicious ISO and LNK files
– Implement threat intelligence to detect SideWinder APT activity
– Secure web servers to prevent compromise
– Strengthen endpoint detection for KernelCallBackTable Injection and Cobalt Strike.
SourceZscaler

Read full article: https://www.zscaler.com/blogs/security-research/warhawk-new-backdoor-arsenal-sidewinder-apt-group

The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *