securityonline.info
Open in
urlscan Pro
2a05:d014:776:a63d:6339:2a28:fc90:eea
Public Scan
URL:
https://securityonline.info/transparent-tribe-sidecopy-a-dangerous-cyber-alliance-targeting-india/
Submission: On May 17 via api from IN — Scanned from DE
Submission: On May 17 via api from IN — Scanned from DE
Form analysis
2 forms found in the DOMhttps://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
https://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
Text Content
Skip to content Penetration Testing * Search for: * Home * Cyber Security * Data Leak * Forensics * Malware Analysis * Malware Attack * Network PenTest * Information Gathering * Vulnerability Analysis * Exploitation * Metasploit * Post Exploitation * Maintaining Access * Password Attacks * Sniffing & Spoofing * Smartphone PenTest * Wireless * Reverse Engineering * Vulnerability * Web PenTest * Web Information Gathering * Web Vulnerability Analysis * Web Exploitation * Web Maintaining Access * Reporting * Home * Cyber Security * Data Leak * Forensics * Malware Analysis * Malware Attack * Network PenTest * Information Gathering * Vulnerability Analysis * Exploitation * Metasploit * Post Exploitation * Maintaining Access * Password Attacks * Sniffing & Spoofing * Smartphone PenTest * Wireless * Reverse Engineering * Vulnerability * Web PenTest * Web Information Gathering * Web Vulnerability Analysis * Web Exploitation * Web Maintaining Access * Reporting Search for: Penetration Testing * Cyber Security TRANSPARENT TRIBE & SIDECOPY: A DANGEROUS CYBER ALLIANCE TARGETING INDIA by do son · May 16, 2024 In a recent analysis, Cyble Research and Intelligence Labs (CRIL) has uncovered alarming developments involving two Advanced Persistent Threat (APT) groups, Transparent Tribe (APT36) and SideCopy. These threat actors are employing sophisticated and overlapping cyber strategies to target India, posing significant risks to both public and private sectors. In the first week of May, CRIL identified a malicious website associated with the SideCopy APT group. This website hosted a file named “files.zip,” containing three directories: “economy,” “it,” and “survey.” The “survey” directory was found to contain lure files similar to those used in previous campaigns, while the other two directories remain undisclosed. SideCopy’s malicious website | Image: CRIL Upon further investigation, CRIL uncovered the use of malicious LNK files in the SideCopy malware campaign. These files, once executed, trigger a series of commands leading to the deployment of malware. The infection starts with a spam email, prompting the download of a ZIP file containing an LNK file disguised as a document. When executed, this file initiates the launch of “mshta.exe” to connect to a malicious URL and download an HTA file, which further executes a malicious DLL. Please enable JavaScript Video Player is loading. Play Video Play Unmute Current Time 0:00 / Duration 7:12 0:00 Remaining Time -7:12 1x Playback Rate Captions * captions off, selected Auto(360pLQ) Fullscreen Settings * Settings * Speed1x * Qualityauto * Back * 2x * 1.5x * 1x, selected * 0.5x * Back Watch on HumixShare The Rise of Cybersecurity Threats: Protecting Digital Assets Share Watch on The HTA file concatenates embedded Base64-encoded strings, decodes them, and writes the resulting content into memory as a malicious DLL named “PreBotHTta.dll.” This DLL uses ActiveX objects for dynamic method invocation to execute its payload, which includes decoding and decompressing additional malicious content. Infection chain | Image: CRIL The malware then downloads a text file from a specified URL, saves it as “newFile.txt,” and utilizes it for further malicious activities. Depending on the installed antivirus software, different execution paths are followed. For instance, if Kaspersky AV is detected, the malware drops additional HTA and batch files to maintain persistence. Similar methods are employed for systems with other antivirus software, ensuring the malware remains active and undetected. In some cases, the malware deploys ReverseRAT, a Remote Access Trojan, by continuously performing malicious activities such as data exfiltration and system monitoring. This RAT adapts its behavior based on the installed antivirus software, showcasing the attackers’ adaptability and sophistication. The SideCopy APT group, operating as a subgroup of Transparent Tribe, presents a significant threat due to their advanced and coordinated attack vectors. Their ability to deploy versatile malware like ReverseRAT and Action RAT underscores the need for robust and flexible cybersecurity defenses. Share Tags: APT groupAPT36SideCopySideCopy APT groupTransparent Tribe * Previous story CVE-2024-34716: Critical Security Vulnerability Uncovered in PrestaShop Follow: * * * * * * SEARCH Secure Your Connection * Popular Posts * Tags * Cyber Security Transparent Tribe & SideCopy: A Dangerous Cyber Alliance Targeting India May 16, 2024 * Cyber Security / Vulnerability Old Vulnerability, New Attacks: Botnets Swarm Exploited CVE-2023-1389 in TP-Link Routers April 16, 2024 * Malware Unstoppable Malware? Report Warns of “Mobile NotPetya” Outbreak Risk April 16, 2024 * Malware Beware! Fake Chrome App “Mamont” Steals Banking Details April 16, 2024 * Cyber Security / Malware “INC” Ransomware Surge: New GOLD IONIC Group Hits Global Targets April 16, 2024 * active directory AMD android Apple backdoor BurpSuite chrome CISA cisco cyberattack Data Breach facebook gitlab google google chrome hacker kali linux Linux Linux Kernel macOS malware metasploit Microsoft nmap nvidia OSINT penetration testing Pentesting PoC powershell privilege escalation Python ransomware shodan sqli sql injection ssh vmware Vulnerability web app webshell windows wireless wordpress XSS Reward BRILLIANTLY SAFE! securityonline.info CONTENT & LINKS Verified by Sur.ly 2022 WEBSITE 1. About SecurityOnline.info 2. Advertise on SecurityOnline.info 3. Contact * About Us * Contact Us * Disclaimer * Privacy Policy * DMCA NOTICE Penetration Testing © 2024. All Rights Reserved. * * * * * * x x ✕ 🍪 PRIVACY & TRANSPARENCY We and our partners use cookies to Store and/or access information on a device. We and our partners use data for Personalised advertising and content, advertising and content measurement, audience research and services development . An example of data being processed may be a unique identifier stored in a cookie. Some of our partners may process your data as a part of their legitimate business interest without asking for consent. To view the purposes they believe they have legitimate interest for, or to object to this data processing use the vendor list link below. The consent submitted will only be used for data processing originating from this website. If you would like to change your settings or withdraw consent at any time, the link to do so is in our privacy policy accessible from our home page. 856 Partners are included for the above purposes. Manage Settings Allow Necessary Cookies & Continue Continue with Recommended Cookies Vendor List | Privacy Policy