Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Researchers recently analyzed a malware sample used in an attack on the Pakistan government, suspected to be the work of the SideWinder advanced persistence threat (APT) group. SideWinder, also known as APT-C-17 and T-APT-04, operates from a South Asian nation-state and focuses on cyber espionage against Asian countries, particularly China and Pakistan. The group has been active since at least 2012 and primarily targets Pakistani government and military organizations.
In this specific attack campaign, the threat actors employed targeted spear-phishing emails to target government organizations. The emails contained a PDF attachment named “Adv-16-2023,” posing as a security advisory issued by the Pakistani Cabinet Division. Upon opening the file, the victim was prompted to download a password-protected RAR file. This compressed file contained a malicious LNK file disguised as a PDF file. Upon opening the LNK file, the attacker used mshta.exe to download and execute the something.hta file.
The downloaded HTA file utilized VBScript to download additional components used in the attack. One component was version.dll, which was placed in the local OneDrive directory. The attacker exploited DLL side-loading to hijack the local OneDrive program and its update program, allowing them to deploy Cobalt Strike, a remote control program often used in penetration testing, to take control of the compromised machine.
The version.dll file was stored in the path %LOCALAPPDATA%\Microsoft\OneDrive\ and required both the 64-bit versions of OneDrive.exe and OneDriveStandaloneUpdater.exe to load. Certain functions within these files were invoked to decrypt and execute subsequent payloads. The shellcode executed reflective loading to dynamically load and execute the Cobalt Strike beacon, establishing a connection with the attacker’s command-and-control server.
According to researchers, the attack also involved domain names such as finance-govpk.servehttp[.]com and csd-govpk.servehttp[.]com, which were associated with phishing documents used in the attack. These domain names were consistent with the naming format attributed to SideWinder, and the C2 server implemented access controls that allowed file downloads only from IP addresses in targeted regions, such as Pakistan.
The SideWinder APT group frequently relies on spear-phishing attacks against specific targets, primarily government and military organizations, to steal sensitive information. Organizations in these sectors should enhance their network infrastructure protection and remain vigilant. The attack demonstrated the use of Cobalt Strike, highlights the need for security vendors to strengthen their detection capabilities to detect such techniques.
Given the Sidewinder APT group’s persistent targeting of government and military organizations and their utilization of sophisticated attack techniques, it is important for these sectors to enhance their network infrastructure protection and remain vigilant against such threats. Security vendors also need to strengthen their detection capabilities to detect and mitigate attacks employing similar tactics and techniques.
35.175.135.236