Rewterz
Strela Stealer Malware Targets Microsoft Outlook Users for Credential Theft – Active IOCs
March 11, 2025
Rewterz
DarkCrystal RAT aka DCRat – Active IOCs
March 12, 2025

SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, the Middle East, and Africa – Active IOCs

Severity

High

Analysis Summary

SideWinder, a sophisticated APT group, has expanded its targeting scope to maritime and logistics companies across South and Southeast Asia, the Middle East, and Africa. The group has been actively attacking entities in Bangladesh, Cambodia, Djibouti, Egypt, the UAE, and Vietnam, with additional focus on nuclear power plants and energy infrastructure in South Asia and Africa. Other sectors of interest include telecommunications, IT services, real estate, consulting firms, and hotels. Moreover, SideWinder has targeted diplomatic entities in multiple countries, including Afghanistan, Algeria, Bulgaria, China, India, the Maldives, Rwanda, Saudi Arabia, Turkey, and Uganda. The group's focus on India is particularly notable due to previous speculation that the threat actor may be of Indian origin. Researchers said, describing it as a "highly advanced and dangerous adversary."

Researcher, analysis in 2024 highlights SideWinder’s ongoing enhancements to its attack toolkit and persistence strategies. The group primarily relies on spear-phishing emails containing malicious documents that exploit the CVE-2017-11882 vulnerability in Microsoft Office Equation Editor. This exploit triggers a multi-stage infection process, deploying a .NET-based downloader called ModuleInstaller, which ultimately launches StealerBot. StealerBot, a modular post-exploitation toolkit first detailed by Researcher, in October 2024, is designed to collect sensitive data from compromised systems. Reports from BlackBerry in July 2024 also emphasized SideWinder’s interest in targeting maritime organizations.

Lure documents used in these campaigns frequently reference nuclear power plants, energy agencies, maritime infrastructures, and port authorities. The group's operations demonstrate a high level of adaptability, particularly in countering security solutions. Researchers have observed that SideWinder closely monitors detection rates of its tools, rapidly modifying its malware within hours if detected. This constant refinement enables them to bypass security defenses effectively. Furthermore, they frequently alter file names, paths, and persistence mechanisms to evade behavioral detections.

The group’s ability to quickly adjust to security countermeasures makes them a highly dangerous adversary. Their use of a modular and evolving attack framework, combined with a broad and strategic victimology, underscores their long-term objectives in cyber espionage and intelligence gathering. By focusing on critical industries such as nuclear energy and maritime logistics, SideWinder poses a serious threat to national security and economic stability across multiple regions.

Impact

  • Sensitive Data Theft
  • Gain Access

Indicators of Compromise

Domain Name

  • pmd-office.info

  • modpak.info

  • dirctt888.info

  • file-dwnld.org

  • defencearmy.pro

  • document-viewer.info

  • crontec.site

  • veorey.live

  • mod-kh.info

MD5

  • e9726519487ba9e4e5589a8a5ec2f933

  • d36a67468d01c4cb789cd6794fb8bc70

  • 313f9bbe6dac3edc09fe9ac081950673

  • bd8043127abe3f5cfa61bd2174f54c60

  • f42ba43f7328cbc9ce85b2482809ff1c

  • a694ccdb82b061c26c35f612d68ed1c2

  • e0bce049c71bc81afe172cd30be4d2b7

  • 0216ffc6fb679bdf4ea6ee7051213c1e

  • 433480f7d8642076a8b3793948da5efe

SHA-256

  • d9e373aeea5fe0c744f0de94fdd366b5b6da816209ac394cbbda1c64c03b50b1

  • 865f5b3b1ee94d89ad9a9840f49a17d477cddfc3742c5ef78d77a6027ad1caa5

  • fa95fadc73e5617305a6b71f77e9d255d14402650075107f2272f131d3cf7b00

  • aacaf712cf67176f159657be2fbd0fce018aa03b890cb1616b146eddb1de73be

  • 30735312101e60a697f161abba62ca359eed240d2e612b1ff7bed6523b28730d

  • 76daea942654d8175f642696fc758b03767db14ca5dda9994797a3f95a34294a

  • 512a83f1a6c404cb0ba679c7a2f3aa782bb5e17840d31a034de233f7500a6cb9

  • 5740947bb9267e1be8281edc31b3fb2d57a71d2c96a47eeeaa6482c0927aa6a4

  • 44ff1117bb0167f85d599236892deede636c358df3d8908582a6ce6a48070bd4

SHA1

  • 5a12b7f4214ac1f79f2b613fb482e58701dfaaa6

  • 84b4b2705018e38253796cd3f84ee68694d9b9c0

  • 96cafccda39d2dd06e22b33ca37504405439c23d

  • 639ccf8e2e0643b0d93db9ebf508ac0f1836cccd

  • 013ead0c89431a69bbe7e7b39a1095dc4faea456

  • 334f3313b03bbfeaae6fc7a0257d4fd8cb6dd751

  • 9a85051a59212febf71e9d5ff29d6998ee909795

  • 71daaff7ba2b92e69a5e94c0efa2f5a097bcd65c

  • 81d00923f2e9e0bae7c51ffbcb66409dd9a3da05

Remediation

  • Block all threat indicators at your respective controls.
  • Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
  • Emails from unknown senders should always be treated with caution.
  • Never trust or open links and attachments received from unknown sources/senders.
  • Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
  • Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
  • Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
  • Enforce strong password policies across the organization. Encourage the use of complex passwords and enable multi-factor authentication (MFA) wherever possible to add an extra layer of security.
  • Deploy reliable endpoint protection solutions that include antivirus, anti-malware, and host-based intrusion prevention systems (HIPS) to detect and block malicious activities.
  • Utilize web filtering and content inspection tools to block access to malicious websites and prevent users from downloading malicious files.
  • Deploy IDPS solutions to detect and block suspicious network traffic and intrusions.
  • Conduct regular vulnerability assessments and penetration testing to identify weaknesses in the network infrastructure and address them before they are exploited by attackers.
  • Continuously monitor network traffic and security logs for any signs of suspicious activities. Stay updated on the latest threat intelligence to understand the tactics, techniques, and procedures (TTPs) employed by the Sidewinder APT group and other threat actors.