Pakistan-Linked Threat Actor SideCopy Exploits WinRAR Vulnerability to Target Indian Government Entities

In recent months, a Pakistan-linked threat actor known as SideCopy has been making waves in the cybersecurity landscape by targeting Indian government entities. This advanced persistent threat (APT) group has been leveraging the recently discovered WinRAR security vulnerability to launch highly sophisticated phishing campaigns. With the delivery of potent remote access trojans (RATs) such as AllaKore RAT, Ares RAT, and DRat, SideCopy has caused significant concerns within India’s cybersecurity defense circles. This article delves into the intricate details of SideCopy’s activities, exploring their tactics, motivations, and potential implications for Indian security.

Campaign and Trojans

SideCopy’s modus operandi revolves around the deployment of RATs to infiltrate Indian government entities. Various reports indicate that SideCopy is a sub-group of Transparent Tribe, also known as APT36, an actor notorious for its aggressive targeting of India. The group’s recent campaigns have specifically capitalized on the WinRAR security vulnerability, exploiting it to deliver remote access trojans.

SideCopy’s activities did not begin with the recent WinRAR campaign. The group has a history of launching phishing campaigns focused on the Indian defense sector. Their past operations involved sophisticated lures that were tailored to appear as if they were from India’s Defense Research and Development Organization. The aim of these campaigns was to deceive unsuspecting victims into disclosing sensitive information and gaining unauthorized access to their systems.

New Phishing Campaigns

SideCopy has escalated its operations by targeting both Linux and Windows operating systems. In their Linux campaign, they employ a Golang-based ELF binary, enabling them to deploy a Linux version of the Ares RAT. This Linux RAT possesses a range of capabilities, including file enumeration and the ability to capture screenshots, granting the threat actor extensive control over compromised systems.

Windows Campaign

Simultaneously, SideCopy has been exploiting the WinRAR vulnerability (commonly referred to as CVE-2023-38831) to execute malicious code and distribute various RATs, such as AllaKore RAT, Ares RAT, DRat, and Key RAT. Of particular concern is AllaKore RAT, which enables SideCopy to steal system information, perform keylogging activities, capture screenshots, and provide complete remote access to compromised machines. Such capabilities grant the group remarkable control over the targeted systems, allowing them to conduct extensive reconnaissance and potentially carry out further malicious activities.

DRat Functionality

SideCopy’s use of DRat in their campaigns adds another layer of complexity to their attacks. DRat allows the threat actor to remotely issue commands from their command and control (C2) server to gather system data, download and execute additional payloads, and perform various file operations. This functionality significantly enhances SideCopy’s ability to exploit compromised systems and remain undetected within the victim’s network for prolonged periods.

One possible explanation for SideCopy’s targeting of Linux systems is India’s recent decision to replace Microsoft Windows with a Linux-based operating system called Maya OS in government and defense sectors. The intentional focus on Linux platforms serves to exploit any potential vulnerabilities or weaknesses in this transition, establishing SideCopy’s presence and implementing their own agenda within Indian governmental systems.

The emergence of SideCopy, with its close ties to Transparent Tribe (APT36), marks a dangerous new phase in India’s cybersecurity landscape. Through the exploitation of the WinRAR vulnerability and the delivery of potent RATs, this threat actor linked to Pakistan has refined its phishing campaigns to target Indian government entities. As the threat landscape evolves and threat actors become increasingly sophisticated, it is imperative for Indian organizations to prioritize cybersecurity measures, deploy robust defense mechanisms, and maintain constant vigilance in order to protect against persistent threats like SideCopy. Only through comprehensive cybersecurity practices can India safeguard its sensitive government information and maintain the integrity of its critical infrastructure.

Explore more

How Agentic AI Combats the Rise of AI-Powered Hiring Fraud

The traditional sanctity of the job interview has effectively evaporated as sophisticated digital puppets now compete alongside human professionals for high-stakes corporate roles. This shift represents a fundamental realignment of the recruitment landscape, where the primary challenge is no longer merely identifying the best talent but confirming the actual existence of the person on the other side of the screen.

Can the Rooney Rule Fix Structural Failures in Hiring?

The persistent tension between traditional executive networking and formal hiring protocols often creates an invisible barrier that prevents many of the most qualified candidates from ever entering the boardroom or reaching the coaching sidelines. Professional sports and high-level executive searches operate in a high-stakes environment where decision-makers often default to known quantities to mitigate perceived risks. This reliance on familiar

How Can You Empower Your Team To Lead Without You?

Ling-yi Tsai, a distinguished HRTech expert with decades of experience in organizational change, joins us to discuss the fundamental shift from hands-on management to systemic leadership. Throughout her career, she has specialized in integrating HR analytics and recruitment technologies to help companies scale without losing their agility. In this conversation, we explore the philosophy of building self-sustaining businesses, focusing on

How Is AI Transforming Finance in the SAP ERP Era?

Navigating the Shift Toward Intelligence in Corporate Finance The rapid convergence of machine learning and enterprise resource planning has fundamentally shifted the baseline for financial performance across the global market. As organizations navigate an increasingly volatile global economy, the traditional Enterprise Resource Planning (ERP) model is undergoing a radical evolution. This transformation has moved past the experimental phase, finding its

Who Are the Leading B2B Demand Generation Agencies in the UK?

Understanding the Landscape of B2B Demand Generation The pursuit of a sustainable sales pipeline has forced UK enterprises to rethink how they engage with a fragmented and increasingly skeptical digital audience. As business-to-business marketing matures, demand generation has moved from a secondary support function to the primary engine for organizational growth. This analysis explores how top-tier agencies are currently navigating