Article Details

Scrape Timestamp (UTC): 2023-11-07 09:01:47.819

Source: https://thehackernews.com/2023/11/sidecopy-exploiting-winrar-flaw-in.html

Original Article Text

Click to Toggle View

SideCopy Exploiting WinRAR Flaw in Attacks Targeting Indian Government Entities. The Pakistan-linked threat actor known as SideCopy has been observed leveraging the recent WinRAR security vulnerability in its attacks targeting Indian government entities to deliver various remote access trojans such as AllaKore RAT, Ares RAT, and DRat. Enterprise security firm SEQRITE described the campaign as multi-platform, with the attacks also designed to infiltrate Linux systems with a compatible version of Ares RAT. SideCopy, active since at least 2019, is known for its attacks on Indian and Afghanistan entities. It's suspected to be a sub-group of the Transparent Tribe (ak APT36). "Both SideCopy and APT36 share infrastructure and code to aggressively target India," SEQRITE researcher Sathwik Ram Prakki said in a Monday report. Earlier this May, the group was linked to a phishing campaign that took advantage of lures related to India's Defence Research and Development Organization (DRDO) to deliver information-stealing malware. Since then, SideCopy has also been implicated in a set of phishing attacks targeting the Indian defense sector with ZIP archive attachments to propagate Action RAT and a new .NET-based trojan that supports 18 different commands. The new phishing campaigns detected by SEQRITE entail two different attack chains, each targeting Linux and Windows operating systems. The former revolves around a Golang-based ELF binary that paves the way for a Linux version of Ares RAT that's capable of enumerating files, taking screenshots, and file downloading and uploading, among others. The second campaign, on the other hand, entails the exploitation of CVE-2023-38831, a security flaw in the WinRAR archiving tool, to trigger the execution of malicious code, leading to the deployment of AllaKore RAT, Ares RAT, and two new trojans called DRat and Key RAT. "[AllaKore RAT] has the functionality to steal system information, keylogging, take screenshots, upload & download files, and take the remote access of the victim machine to send commands and upload stolen data to the C2," Ram Prakki said. DRat is capable of parsing as many as 13 commands from the C2 server to gather system data, download and execute additional payloads, and perform other file operations. The targeting of Linux is not coincidental and is likely motivated by India's decision to replace Microsoft Windows with a Linux flavor called Maya OS across government and defense sectors. "Expanding its arsenal with zero-day vulnerability, SideCopy consistently targets Indian defense organizations with various remote access trojans," Ram Prakki said. "APT36 is expanding its Linux arsenal constantly, where sharing its Linux stagers with SideCopy is observed to deploy an open-source Python RAT called Ares."

Daily Brief Summary

NATION STATE ACTIVITY // SideCopy Exploits WinRAR Flaw in Attacks on Indian Government

The Pakistan-linked threat actor SideCopy has been exploiting a WinRAR security vulnerability to attack Indian government entities, delivering various remote access trojans.

Cybersecurity firm SEQRITE described the campaign as multi-platform, with the attacks designed to infiltrate both Windows and Linux systems.

SideCopy, suspected to be a subgroup of the Transparent Tribe (APT36), shares infrastructure and code with APT36 to target Indian entities deliberately.

Previously this year, SideCopy was connected to a phishing campaign using India's Defence Research and Development Organization (DRDO)-related lures to deliver information-stealing malware.

Recently, SideCopy is involved in new phishing attacks targeting the Indian defense sector with ZIP archive attachments that propagate Action RAT and a new .NET-based trojan.

The most recent attack campaigns target both Linux and Windows systems, exploiting CVE-2023-38831, a security flaw in the WinRAR archiving tool, to execute malicious code and deploy various remote access trojans.

These activities are likely motivated by India's decision to replace Microsoft Windows with a Linux flavor called Maya OS across government and defense sectors. The schemes from SideCopy consistently target these organizations.

APT36 continues expanding its Linux arsenal, providing SideCopy with Linux stagers to deploy an open-source Python RAT known as Ares.