Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-03-11 12:30:00 |
Sidewinder APT cible les secteurs maritime, nucléaire et informatique à travers l'Asie, le Moyen-Orient et l'Afrique SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa (lien direct) |
Les sociétés maritimes et logistiques en Asie du Sud et du Sud-Est, au Moyen-Orient et en Afrique sont devenues la cible d'un groupe avancé de menace persistante (APT) surnommée Sidewinder.
Les attaques, observées par Kaspersky en 2024, se sont répandues à travers le Bangladesh, le Cambodge, Djibouti, l'Égypte, les Émirats arabes unis et le Vietnam. Les autres cibles d'intérêt comprennent les centrales nucléaires et l'énergie nucléaire
Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group dubbed SideWinder.
The attacks, observed by Kaspersky in 2024, spread across Bangladesh, Cambodia, Djibouti, Egypt, the United Arab Emirates, and Vietnam. Other targets of interest include nuclear power plants and nuclear energy |
Threat
|
APT-C-17
|
★★★
|
 |
2024-10-17 15:45:00 |
Sidewinder APT frappe le Moyen-Orient et l'Afrique avec une attaque à plusieurs étapes furtive SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack (lien direct) |
Un acteur avancé de menace persistante (APT) ayant des liens présumés avec l'Inde est sorti avec une rafale d'attaques contre les entités de grande envergure et les infrastructures stratégiques au Moyen-Orient et en Afrique.
L'activité a été attribuée à un groupe suivi en tant que Sidewinder, qui est également connu sous le nom d'APT-C-17, Baby Elephant, Hardcore Nationalist, LeafperForator, RattleSnake, Razor Tiger et T-APT-04.
"
An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against high-profile entities and strategic infrastructures in the Middle East and Africa.
The activity has been attributed to a group tracked as SideWinder, which is also known as APT-C-17, Baby Elephant, Hardcore Nationalist, Leafperforator, Rattlesnake, Razor Tiger, and T-APT-04.
" |
Threat
|
APT-C-17
|
★★★
|
 |
2024-07-30 13:02:00 |
Nouvelles cyberattaques Sidewinder ciblent les installations maritimes dans plusieurs pays New SideWinder Cyber Attacks Target Maritime Facilities in Multiple Countries (lien direct) |
L'acteur de menace nationale connue sous le nom de Sidewinder a été attribué à une nouvelle campagne de cyber-espionnage ciblant les ports et les installations maritimes dans l'océan Indien et la mer Méditerranée.
L'équipe Blackberry Research and Intelligence, qui a découvert l'activité, a déclaré que les cibles de la campagne de phisces de lance comprennent des pays comme le Pakistan, l'Égypte, le Sri Lanka, le Bangladesh, le Myanmar, le Népal et le
The nation-state threat actor known as SideWinder has been attributed to a new cyber espionage campaign targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea.
The BlackBerry Research and Intelligence Team, which discovered the activity, said targets of the spear-phishing campaign include countries like Pakistan, Egypt, Sri Lanka, Bangladesh, Myanmar, Nepal, and the |
Threat
|
APT-C-17
|
★★★
|
 |
2023-05-17 14:10:00 |
Infrastructure d'attaque secrète du groupe de piratage de l'État parrainé par l'État découvert State-Sponsored Sidewinder Hacker Group\\'s Covert Attack Infrastructure Uncovered (lien direct) |
Les chercheurs en cybersécurité ont mis au jour les infrastructures d'attaque non documentées précédemment utilisées par le prolifique du groupe de groupe parrainé par l'État pour frapper des entités situées au Pakistan et en Chine.
Cela comprend un réseau de 55 domaines et adresses IP utilisés par l'acteur de menace, les sociétés de cybersécurité Group-IB et Bridewell ont déclaré dans un rapport conjoint partagé avec les nouvelles de Hacker.
"Le phishing identifié
Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike entities located in Pakistan and China.
This comprises a network of 55 domains and IP addresses used by the threat actor, cybersecurity companies Group-IB and Bridewell said in a joint report shared with The Hacker News.
"The identified phishing |
Threat
|
APT-C-17
|
★★
|
 |
2023-05-09 15:09:00 |
Les chercheurs découvrent la dernière technique du polymorphisme basé sur le serveur de Sidewinder \\ Researchers Uncover SideWinder\\'s Latest Server-Based Polymorphism Technique (lien direct) |
L'acteur avancé de menace persistante (APT) connue sous le nom de Sidewinder a été accusé d'avoir déployé une porte dérobée dans des attaques dirigées contre les organisations gouvernementales pakistanaises dans le cadre d'une campagne qui a commencé fin novembre 2022.
"Dans cette campagne, le groupe de menace persistante avancée (APT) Advanced Advanced Advance
The advanced persistent threat (APT) actor known as SideWinder has been accused of deploying a backdoor in attacks directed against Pakistan government organizations as part of a campaign that commenced in late November 2022.
"In this campaign, the SideWinder advanced persistent threat (APT) group used a server-based polymorphism technique to deliver the next stage payload," the BlackBerry |
Threat
|
APT-C-17
|
★★★
|
 |
2023-02-16 23:46:00 |
Researchers Link SideWinder Group to Dozens of Targeted Attacks in Multiple Countries (lien direct) |
The prolific SideWinder group has been attributed as the nation-state actor behind attempted attacks against 61 entities in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka between June and November 2021.
Targets included government, military, law enforcement, banks, and other organizations, according to an exhaustive report published by Group-IB, which also found links between the adversary |
|
APT-C-17
|
★★★
|
 |
2022-10-24 11:55:00 |
SideWinder APT Using New WarHawk Backdoor to Target Entities in Pakistan (lien direct) |
SideWinder, a prolific nation-state actor mainly known for targeting Pakistan military entities, compromised the official website of the National Electric Power Regulatory Authority (NEPRA) to deliver a tailored malware called WarHawk.
"The newly discovered WarHawk backdoor contains various malicious modules that deliver Cobalt Strike, incorporating new TTPs such as KernelCallBackTable injection |
Malware
|
APT-C-17
|
|
 |
2022-06-02 01:38:51 |
SideWinder Hackers Use Fake Android VPN Apps to Target Pakistani Entities (lien direct) |
The threat actor known as SideWinder has added a new custom tool to its arsenal of malware that's being used in phishing attacks against Pakistani public and private sector entities.
"Phishing links in emails or posts that mimic legitimate notifications and services of government agencies and organizations in Pakistan are primary attack vectors of the gang," Singapore-headquartered cybersecurity |
Malware
Tool
Threat
|
APT-C-17
|
|
 |
2022-05-31 00:30:39 |
SideWinder Hackers Launched Over a 1,000 Cyber Attacks Over the Past 2 Years (lien direct) |
An "aggressive" advanced persistent threat (APT) group known as SideWinder has been linked to over 1,000 new attacks since April 2020.
"Some of the main characteristics of this threat actor that make it stand out among the others, are the sheer number, high frequency and persistence of their attacks and the large collection of encrypted and obfuscated malicious components used in their |
Threat
|
APT-C-17
|
|
 |
2020-01-07 08:41:42 |
3 Google Play Store Apps Exploit Android Zero-Day Used by NSO Group (lien direct) |
Watch out! If you have any of the below-mentioned file managers and photography apps installed on your Android phone-even if downloaded from the official Google Store store-you have been hacked and being tracked.
These newly detected malicious Android apps are Camero, FileCrypt, and callCam that are believed to be linked to Sidewinder APT, a sophisticated hacking group specialized in cyber |
|
APT-C-17
|
|