• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  APT • Cybersecurity  /  Seqrite uncovers second wave of Operation SideCopy targeting Indian critical infrastructure PSUs
Seqrite uncovers second wave of Operation SideCopy targeting Indian critical infrastructure PSUs
09 July 2021

Seqrite uncovers second wave of Operation SideCopy targeting Indian critical infrastructure PSUs

Written by Chaitanya Haritash
Chaitanya Haritash
APT, Cybersecurity

The SideCopy APT Group has expanded its activity this year and now targets critical Indian sectors this time.

Quick Heal Security Labs researchers have been tracking the notorious cyber-attack group – ‘Transparent Tribe’ since the first SideCopy campaign in September 2020, discovered by Quick Heal.  The team has recently discovered an increase in SideCopy’s activities targeting certain Government agencies in India. The group has added new malware tools to its arsenal.

Another attack campaign that we discovered in March 2021 (ref. blog), seems to be part of the more extensive SideCopy campaign. The spear-phishing attack campaign used the Army Welfare Education Society’s scholarship form as a lure.

The second wave of SideCopy uses COVID-19 as a lure, which is not unique since, in the last year & a half, the COVID-19 theme has been used in numerous cyber-attacks. However, this is the first time that the COVID-19 theme is being used in the SideCopy campaign.

In most cases, successful execution of the attack would result in deploying a Remote Administration Tool. If a RAT gets installed, the attackers will get unrestricted access to the machine and steal sensitive data from these agencies.

 

Key Findings

  • Operation SideCopy which is active from early 2019, is expanding its arsenal.
  • The latest attacks in this campaign are using COVID-19 as a lure
  • This campaign is targeting critical Government entities in India.
  • Almost all CnC belongs to Contabo GmbH and server names are similar to machine names found in the previous report in September 2020.
  • The attack results in the deployment of a Remote Administration Tool (RAT).
  • The attack tools & methods have also been enhanced to make detection difficult.

 

Execution Chain

Custom C# Implant: ReverseRAT

The APT group carefully chooses their targets, upgrades tools in their arsenal based on the targets and mainly uses limited but effective functionality in being evasive.

Most of the backdoors used in the campaign are NJRat; however, in one specific case, we came across a new payload written in C#, which installs an implant enabling attackers to examine the target and install other backdoors. This implant appears to be an advanced version of the implant that we analyzed in our previous write-up.

 

How Seqrite protects its users?

We have the following detections for the malicious samples:

  • APT.42504
  • APT.42506
  • Mshta.Downloader.41981
  • Trojan.A1672450
  • Trojan.Agent.41884
  • YakbeexMSIL.ZZ4
  • MsilFC.S17874654
  • Ghanarava.1612026585faf3ed
  • Agent

Also, the domains and IPs used are classified as malicious/compromised by Quick Heal.

 

Summary

The transparent Tribe attack group has been linked with Pakistan in the past as well. The evidence presented in this paper goes on to strengthen that claim even further.

In the current campaign, SideCopy/Transparent Tribe is once again targeting critical government entities in India. The attack tools & methods have also been enhanced to make detection difficult. This shows that this attack group is well-funded and actively improves attack mechanisms to infiltrate the target entities.

We advise our customers to be aware of such attacks, set up necessary cybersecurity controls, follow good cybersecurity practices, train their employees on cyber risks, and keep monitoring their environment for anything suspicious. For a more detailed analysis of operation SideCopy, please download our Targeting Critical Indian Infrastructure Operation SideCopy here:

 

Subject matter experts:

Chaitanya Haritash, Security Researcher II

Nihar Deshpande, Senior Security Researcher

Shayak Tarafdar, Security Research Lead

 Previous PostAdvisory on Kaseya VSA Supply-Chain Ransomware Attack
Next Post  REvil Returns: Diving Deeper Into the Kaseya VSA Ransomware Attac...
Chaitanya Haritash

About Chaitanya Haritash

Chaitanya Haritash works as Security Researcher in Security Labs at QuickHeal. His main focus is on hunting unique threats and writing detection. Chaitanya is...

Articles by Chaitanya Haritash »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies