SideCopy APT Campaign Found Targeting Indian Universities

Since May 2023, the SideCopy campaign has been targeting university students with complex infection chains, utilizing malicious LNK files, HTAs, and loader DLLs masquerading as genuine documents.

Cyble Research and Intelligence Labs (CRIL) researchers have uncovered a new SideCopy campaign. The threat actor group has previously been observed targeting South Asian nations with a particular focus on government and military targets in India and Afghanistan.

Active since May 2023, the campaign targets university students through sophisticated infection chains involving malicious LNK files, HTAs, and loader DLLs disguised as legitimate documents. Ultimately, the campaign deploys malware payloads such as Reverse RAT and Action RAT, granting attackers extensive control over infected devices.

The research explores the tactics employed by SideCopy, such as their recent focus on university students, and potential overlap in activities with the Transparent Tribe APT group.

Technical Analysis of the SideCopy Campaign Infection Chain

In early May, CRIL identified a malicious domain employed by the SideCopy group in their operations. The website was discovered hosting a ZIP archive file named “files.zip” that contained sub-directories labeled as “economy,” “it,” and “survey.” The survey directory included files similar to those previously employed by SideCopy in their earlier campaigns.

Source: Cyble

The campaign likely employs spam emails to distribute the malicious ZIP archive hosted through the compromised website as the initial infection vector. These archives contain malicious LNK files disguised as legitimate documents, such as “IT Trends.docx.lnk.”

Upon execution, the LNK files trigger a series of commands that proceeds to download and execute a malicious HTA file. The downloaded HTA files contain embedded payloads within additional lure documents and DLL files. The lure documents are typically themed around current affairs or relevant academic topics to appear legitimate to the targeted demographic.

Source: Cyble Blog
Source: Cyble Blog

The malware is crafted with the functionality to adopt to the presence of different antivirus software such as Avast, Kaspersky and Bitdefender, which further amplifies its ability to evade detection and ensure persistence by placing the LNK shortcut files in the startup folder.

The attack process ultimately leads to the deployment of malicious payloads such as Reverse RAT and Action RAT on to the victim system, which then connect to a remote Command-and-Control (C&C) server to commence malicious activities.

Intersection with Transparent Tribe Activities

The research further suggests a potential overlap or collaboration between SideCopy and Transparent Tribe, another APT group known for targeting Indian military and academic institutions. This intersection hints at a possible collaborative efforts or shared objectives between the two groups with researchers previously noting that SideCopy may function as a sub-division of Transparent Tribe.

SideCopy is also known to emulate tactics of the Sidewinder APT group in the distribute of malware files, such as the use of disguised LNK files to initiate a complex chain of infections.

CRIL researchers have advised the use of strong email filtering systems, exercise of caution, the deployment of network-level monitoring and the disabling of scripting languages such as PowerShell, MSHTA, cmd.exe to prevent against this potential threat.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Alan J

Experienced cybersecurity and threat-intelligence writer, with strong interest in history, geo-politics, technology and public policy.

Recent Posts

The Cyber Express Weekly Roundup: Ransomware, and Supply Chain Breaches Surge

This weekly roundup highlights top cybersecurity news: Hasbro attack, AI supply chain breaches, and rising ransomware threats worldwide.

1 day ago

Vietnam-Linked PXA Stealer Campaign Exploits LinkedIn to Target Professionals Globally

PXA Stealer, deployed by Vietnam-linked actors, hijacks LinkedIn accounts and exfiltrates credentials, crypto wallets, and sensitive data worldwide.

2 days ago

FBI Warns of Data Security Risks in Foreign-Developed Mobile Apps

The data security risks of foreign-developed mobile apps are not limited to what users see on the surface.

2 days ago

FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries

AVrecon spreads by scanning the internet for devices with exposed vulnerable services.

2 days ago

Intesa Sanpaolo Missed Unauthorized Access for 2 Years, Regulator Reveals

What stands out in this case is that even access involving politically exposed and high-profile individuals did not trigger alerts.

2 days ago

Hasbro Discloses Cyberattack After Unauthorized Network Access Detected

Hasbro cyberattack confirmed on March 28, taking systems offline and launching an investigation with third-party cybersecurity experts.

2 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More