• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: apt

Unveiling Silent Lynx APT Targeting Entities Across Kyrgyzstan & Neighbouring Nations

Unveiling Silent Lynx APT Targeting Entities Across Kyrgyzstan & Neighbouring Nations

Estimated reading time: 10 minutes

Silent Lynx APT Targets Various Entities Across Kyrgyzstan & Neighbouring Nations Contents Key Targets Industries Affected Geographical Focus Infection Chain Initial Findings Campaign 1 Looking into the malicious email Looking into decoy document. Campaign 2 Looking into the malicious...
Read Blog
January 21, 2025

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Estimated reading time: 16 minutes

An open directory hosting malware linked to Transparent Tribe (APT36) has been found by SEQRITE Labs APT team. Further analysis revealed hidden URLs on the same domain containing payloads used by its sub-division APT group SideCopy. Targeting of Indian...
Read Blog
July 25, 2024

SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT

SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT

Estimated reading time: 11 minutes

SEQRITE Labs APT-Team has discovered multiple campaigns of APT SideCopy, targeting Indian government and defense entities in the past few months. The threat group is now exploiting the recent WinRAR vulnerability CVE-2023-38831 (See our advisory for more details) to...
Read Blog
November 6, 2023

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Estimated reading time: 3 minutes

Overview A new attack campaign of SideCopy APT has been discovered targeting the Indian Defence sector. The group utilizes phishing email attachments & URLs as the infection vector to download malicious archive files leading to the deployment of two...
Read Blog
June 15, 2023

Seqrite uncovers second wave of Operation SideCopy targeting Indian critical infrastructure PSUs

Seqrite uncovers second wave of Operation SideCopy targeting Indian critical infrastructure PSUs

Estimated reading time: 3 minutes

The SideCopy APT Group has expanded its activity this year and now targets critical Indian sectors this time. Quick Heal Security Labs researchers have been tracking the notorious cyber-attack group – ‘Transparent Tribe’ since the first SideCopy campaign in...
Read Blog
July 9, 2021

New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form

New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form

Estimated reading time: 4 minutes

Introduction: Researchers at Quick Heal Security Labs have uncovered a potential Spear Phishing campaign targeted against Indian Army personnel. In this attack, the attackers are using “Army Welfare Education Society” Scholarship form as lure. About AWES: Army Welfare Education...
Read Blog
March 22, 2021

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Estimated reading time: 2 minutes

Making accurate predictions, especially for cybersecurity needs years of experience — 2020 was a different situation altogether. Amidst many forecasts, no one predicted the onslaught of a global pandemic that would disrupt the world as we know it, baffling...
Read Blog
February 18, 2021

RAT used by Chinese cyberspies infiltrating Indian businesses

RAT used by Chinese cyberspies infiltrating Indian businesses

Estimated reading time: 4 minutes

A few months back, Delphibased malware was being distributed on multiple systems via SMB exploit. The payloads used by this malware have close similarities with open-source Gh0stRAT code. Gh0st has been used by Chinese threat actors to target multiple...
Read Blog
December 18, 2020

Attacks on the defence sector could prove very costly!

Attacks on the defence sector could prove very costly!

Estimated reading time: 2 minutes

In the current modern era of information warfare, securing military assets has become strategically very important. Recently, Seqrite reported on Operation ‘Honey Trap’, an operation launched by a Pakistan-linked threat actor allegedly, which targeted employees from Indian defence organizations....
Read Blog
October 16, 2020

Operation SideCopy!

Operation SideCopy!

Estimated reading time: 2 minutes

An insight into Transparent Tribe’s sub-division which has been incorrectly attributed for years. Introduction Quick Heal’s threat intelligence team recently uncovered evidence of an advanced persistent threat (APT) against Indian defence forces. Our analysis shows that many old campaigns...
Read Blog
September 23, 2020
4
← Previous 1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (12) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (39) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies