Pakistan-Linked Threat Actor SideCopy Exploits WinRAR Vulnerability to Target Indian Government Entities

In recent months, a Pakistan-linked threat actor known as SideCopy has been making waves in the cybersecurity landscape by targeting Indian government entities. This advanced persistent threat (APT) group has been leveraging the recently discovered WinRAR security vulnerability to launch highly sophisticated phishing campaigns. With the delivery of potent remote access trojans (RATs) such as AllaKore RAT, Ares RAT, and DRat, SideCopy has caused significant concerns within India’s cybersecurity defense circles. This article delves into the intricate details of SideCopy’s activities, exploring their tactics, motivations, and potential implications for Indian security.

Campaign and Trojans

SideCopy’s modus operandi revolves around the deployment of RATs to infiltrate Indian government entities. Various reports indicate that SideCopy is a sub-group of Transparent Tribe, also known as APT36, an actor notorious for its aggressive targeting of India. The group’s recent campaigns have specifically capitalized on the WinRAR security vulnerability, exploiting it to deliver remote access trojans.

SideCopy’s activities did not begin with the recent WinRAR campaign. The group has a history of launching phishing campaigns focused on the Indian defense sector. Their past operations involved sophisticated lures that were tailored to appear as if they were from India’s Defense Research and Development Organization. The aim of these campaigns was to deceive unsuspecting victims into disclosing sensitive information and gaining unauthorized access to their systems.

New Phishing Campaigns

SideCopy has escalated its operations by targeting both Linux and Windows operating systems. In their Linux campaign, they employ a Golang-based ELF binary, enabling them to deploy a Linux version of the Ares RAT. This Linux RAT possesses a range of capabilities, including file enumeration and the ability to capture screenshots, granting the threat actor extensive control over compromised systems.

Windows Campaign

Simultaneously, SideCopy has been exploiting the WinRAR vulnerability (commonly referred to as CVE-2023-38831) to execute malicious code and distribute various RATs, such as AllaKore RAT, Ares RAT, DRat, and Key RAT. Of particular concern is AllaKore RAT, which enables SideCopy to steal system information, perform keylogging activities, capture screenshots, and provide complete remote access to compromised machines. Such capabilities grant the group remarkable control over the targeted systems, allowing them to conduct extensive reconnaissance and potentially carry out further malicious activities.

DRat Functionality

SideCopy’s use of DRat in their campaigns adds another layer of complexity to their attacks. DRat allows the threat actor to remotely issue commands from their command and control (C2) server to gather system data, download and execute additional payloads, and perform various file operations. This functionality significantly enhances SideCopy’s ability to exploit compromised systems and remain undetected within the victim’s network for prolonged periods.

One possible explanation for SideCopy’s targeting of Linux systems is India’s recent decision to replace Microsoft Windows with a Linux-based operating system called Maya OS in government and defense sectors. The intentional focus on Linux platforms serves to exploit any potential vulnerabilities or weaknesses in this transition, establishing SideCopy’s presence and implementing their own agenda within Indian governmental systems.

The emergence of SideCopy, with its close ties to Transparent Tribe (APT36), marks a dangerous new phase in India’s cybersecurity landscape. Through the exploitation of the WinRAR vulnerability and the delivery of potent RATs, this threat actor linked to Pakistan has refined its phishing campaigns to target Indian government entities. As the threat landscape evolves and threat actors become increasingly sophisticated, it is imperative for Indian organizations to prioritize cybersecurity measures, deploy robust defense mechanisms, and maintain constant vigilance in order to protect against persistent threats like SideCopy. Only through comprehensive cybersecurity practices can India safeguard its sensitive government information and maintain the integrity of its critical infrastructure.

Explore more

How Is Email Marketing Evolving with AI and Privacy Trends?

In today’s fast-paced digital landscape, email marketing remains a cornerstone of business communication, yet its evolution is accelerating at an unprecedented rate to meet the demands of savvy consumers and cutting-edge technology. As a channel that has long been a reliable means of reaching audiences, email marketing is undergoing a profound transformation, driven by advancements in artificial intelligence, shifting privacy

Why Choose FolderFort for Affordable Cloud Storage?

In an era where digital data is expanding at an unprecedented rate, finding a reliable and cost-effective cloud storage solution has become a pressing challenge for individuals and businesses alike, especially with countless files, photos, and projects piling up. The frustration of juggling multiple platforms or facing escalating subscription fees can be overwhelming. Many users find themselves trapped in a

How Can Digital Payments Unlock Billions for UK Consumers?

In an era where financial struggles remain a stark reality for millions across the UK, the promise of digital payment solutions offers a transformative pathway to economic empowerment, with recent research highlighting how innovations in this space could unlock billions in savings for consumers. These advancements also address the persistent challenge of financial exclusion. With millions lacking access to basic

Trend Analysis: Digital Payments in Township Economies

In South African townships, a quiet revolution is unfolding as digital payments reshape the economic landscape, with over 60% of spaza shop owners adopting digital transaction tools in recent years. This dramatic shift from the cash-only norm that once defined local commerce signifies more than just a change in payment methods; it represents a critical step toward financial inclusion and

Modern CRM Platforms – Review

Setting the Stage for CRM Evolution In today’s fast-paced business environment, sales teams are under immense pressure to close deals faster, with a staggering 65% of sales reps reporting that administrative tasks consume over half their workday, according to industry surveys. This challenge of balancing productivity with growing customer expectations has pushed companies to seek advanced solutions that streamline processes