Pakistan-Linked Threat Actor SideCopy Exploits WinRAR Vulnerability to Target Indian Government Entities

In recent months, a Pakistan-linked threat actor known as SideCopy has been making waves in the cybersecurity landscape by targeting Indian government entities. This advanced persistent threat (APT) group has been leveraging the recently discovered WinRAR security vulnerability to launch highly sophisticated phishing campaigns. With the delivery of potent remote access trojans (RATs) such as AllaKore RAT, Ares RAT, and DRat, SideCopy has caused significant concerns within India’s cybersecurity defense circles. This article delves into the intricate details of SideCopy’s activities, exploring their tactics, motivations, and potential implications for Indian security.

Campaign and Trojans

SideCopy’s modus operandi revolves around the deployment of RATs to infiltrate Indian government entities. Various reports indicate that SideCopy is a sub-group of Transparent Tribe, also known as APT36, an actor notorious for its aggressive targeting of India. The group’s recent campaigns have specifically capitalized on the WinRAR security vulnerability, exploiting it to deliver remote access trojans.

SideCopy’s activities did not begin with the recent WinRAR campaign. The group has a history of launching phishing campaigns focused on the Indian defense sector. Their past operations involved sophisticated lures that were tailored to appear as if they were from India’s Defense Research and Development Organization. The aim of these campaigns was to deceive unsuspecting victims into disclosing sensitive information and gaining unauthorized access to their systems.

New Phishing Campaigns

SideCopy has escalated its operations by targeting both Linux and Windows operating systems. In their Linux campaign, they employ a Golang-based ELF binary, enabling them to deploy a Linux version of the Ares RAT. This Linux RAT possesses a range of capabilities, including file enumeration and the ability to capture screenshots, granting the threat actor extensive control over compromised systems.

Windows Campaign

Simultaneously, SideCopy has been exploiting the WinRAR vulnerability (commonly referred to as CVE-2023-38831) to execute malicious code and distribute various RATs, such as AllaKore RAT, Ares RAT, DRat, and Key RAT. Of particular concern is AllaKore RAT, which enables SideCopy to steal system information, perform keylogging activities, capture screenshots, and provide complete remote access to compromised machines. Such capabilities grant the group remarkable control over the targeted systems, allowing them to conduct extensive reconnaissance and potentially carry out further malicious activities.

DRat Functionality

SideCopy’s use of DRat in their campaigns adds another layer of complexity to their attacks. DRat allows the threat actor to remotely issue commands from their command and control (C2) server to gather system data, download and execute additional payloads, and perform various file operations. This functionality significantly enhances SideCopy’s ability to exploit compromised systems and remain undetected within the victim’s network for prolonged periods.

One possible explanation for SideCopy’s targeting of Linux systems is India’s recent decision to replace Microsoft Windows with a Linux-based operating system called Maya OS in government and defense sectors. The intentional focus on Linux platforms serves to exploit any potential vulnerabilities or weaknesses in this transition, establishing SideCopy’s presence and implementing their own agenda within Indian governmental systems.

The emergence of SideCopy, with its close ties to Transparent Tribe (APT36), marks a dangerous new phase in India’s cybersecurity landscape. Through the exploitation of the WinRAR vulnerability and the delivery of potent RATs, this threat actor linked to Pakistan has refined its phishing campaigns to target Indian government entities. As the threat landscape evolves and threat actors become increasingly sophisticated, it is imperative for Indian organizations to prioritize cybersecurity measures, deploy robust defense mechanisms, and maintain constant vigilance in order to protect against persistent threats like SideCopy. Only through comprehensive cybersecurity practices can India safeguard its sensitive government information and maintain the integrity of its critical infrastructure.

Explore more

Why is LinkedIn the Go-To for B2B Advertising Success?

In an era where digital advertising is fiercely competitive, LinkedIn emerges as a leading platform for B2B marketing success due to its expansive user base and unparalleled targeting capabilities. With over a billion users, LinkedIn provides marketers with a unique avenue to reach decision-makers and generate high-quality leads. The platform allows for strategic communication with key industry figures, a crucial

Endpoint Threat Protection Market Set for Strong Growth by 2034

As cyber threats proliferate at an unprecedented pace, the Endpoint Threat Protection market emerges as a pivotal component in the global cybersecurity fortress. By the close of 2034, experts forecast a monumental rise in the market’s valuation to approximately US$ 38 billion, up from an estimated US$ 17.42 billion. This analysis illuminates the underlying forces propelling this growth, evaluates economic

How Will ICP’s Solana Integration Transform DeFi and Web3?

The collaboration between the Internet Computer Protocol (ICP) and Solana is poised to redefine the landscape of decentralized finance (DeFi) and Web3. Announced by the DFINITY Foundation, this integration marks a pivotal step in advancing cross-chain interoperability. It follows the footsteps of previous successful integrations with Bitcoin and Ethereum, setting new standards in transactional speed, security, and user experience. Through

Embedded Finance Ecosystem – A Review

In the dynamic landscape of fintech, a remarkable shift is underway. Embedded finance is taking the stage as a transformative force, marking a significant departure from traditional financial paradigms. This evolution allows financial services such as payments, credit, and insurance to seamlessly integrate into non-financial platforms, unlocking new avenues for service delivery and consumer interaction. This review delves into the

Certificial Launches Innovative Vendor Management Program

In an era where real-time data is paramount, Certificial has unveiled its groundbreaking Vendor Management Partner Program. This initiative seeks to transform the cumbersome and often error-prone process of insurance data sharing and verification. As a leader in the Certificate of Insurance (COI) arena, Certificial’s Smart COI Network™ has become a pivotal tool for industries relying on timely insurance verification.