8 July 2021

SideCopy cyber-espionage group updates its arsenal with new RATs


SideCopy cyber-espionage group updates its arsenal with new RATs

SideCopy, a cyber-espionage group, which mainly targets Indian army personnel, has increased its activity this year and added new malware tools to its arsenal, according to a new report from Cisco Talos.

Active since 2019, the group mimics the Sidewinder APT’s (a threat actor mainly targeting Pakistan military targets) infection chains to deliver their own malware.

Previous SideCopy’s campaigns involved malicious LNK files and documents delivering a custom C#-based malware dubbed CetaRAT by security researchers, as well as Allakore RAT, a publicly available Delphibased RAT. However, in recent campaigns the group has been observed using new plugins and RAT families, such as DetaRAT, ReverseRAT, MargulasRAT and ActionRAT. The APT group has also been observed using commodity RATs, including njRAT, Lilith and Epicenter.

“SideCopy campaigns indicate a high degree of similarity to the Transparent Tribe APT (aka APT36) also targeting India. These include using decoys posing as operational documents belonging to the military and think tanks and honeytrap-based infections,” Cisco Talos said.

The researchers noted that SideCopy’s infection chains have remained largely the same with minor variations - using malicious LNK files as entry points, followed by a convoluted infection chain involving multiple HTAs and loader DLLs to deliver the final payloads. If successful, the attack results in the installation of independent plugins with various capabilities, such as file enumeration, browser password stealing and keylogging.

Development of new RAT malware is an indication that the SideCopy cyber-espionage group is quickly evolving becoming more sophisticated, the researchers warned.


Back to the list

Latest Posts

Pakistan-linked APT36 intensifies cyber espionage on Indian entities

Pakistan-linked APT36 intensifies cyber espionage on Indian entities

The threat actor has frequently targeted Indian government agencies, military installations, and diplomatic networks.
5 November 2024
Canadian authorities arrest suspected Snowflake hacker linked to major corporate data breaches

Canadian authorities arrest suspected Snowflake hacker linked to major corporate data breaches

The arrest took place on October 30, 2024, under a provisional warrant issued at the request of US authorities.
5 November 2024
China-linked Volt Typhoon reportedly breached Singapore’s largest mobile carrier Singtel

China-linked Volt Typhoon reportedly breached Singapore’s largest mobile carrier Singtel

It is believed that the Singtel breach may have served as a trial for further incursions into US telecoms networks.
5 November 2024