Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Top tech startup funding news for today, May 20, 2025

Trump says we will put weapons in space as part of the “Golden Dome” plan | Military News

Microsoft Build 2025: All the big AI announcements you need to know

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Sidewinder hit South Asia with old office flaws and custom malware
Identity

Sidewinder hit South Asia with old office flaws and custom malware

userBy userMay 20, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 20, 2025Ravi LakshmananMalware/Cyberspy

High-level government agencies in Sri Lanka, Bangladesh and Pakistan have emerged as targets for new campaigns organized by threat actors known as Sidewinders.

“The attackers used spear phishing emails paired with geophishing payloads to ensure that only victims of certain countries received malicious content,” Acronis researchers Santiago Pontiloli, Josse F Jegeny and Prakas Zavendaran said in a report shared with Hacker News.

The attack chain utilizes spearfishing laiders as a starting point for activating the infection process and deploying known malware called Stealerbot. It is worth pointing out that this trick coincides with the recent sidewinder attack documented by Kaspersky in March 2025.

Cybersecurity

Part of the campaign’s goals, Acronis includes Bangladesh’s Telecommunications Regulatory Commission, the Ministry of Defense and the Ministry of Finance. Pakistan’s Indigenous Peoples’ Technology Development Bureau. Ministry of External Resources, Ministry of Finance, Ministry of Defense, and Central Bank of Sri Lanka.

The attack is characterized by the use of years of remote code execution flaws in Microsoft Office (CVE-2017-0199 and CVE-2017-11882) as an initial vector for deploying malware that can maintain permanent access in the South Asian government environment.

When the malicious document opens, triggers an exploit for CVE-2017-0199 to provide the next stage payload responsible for installing StealerBot using DLL sideload technology.

One notable tactic that Sidewinder employs is to ensure that spear phishing emails are linked to the Geofykend payload to ensure that only victims who meet targeting criteria are served to malicious content. If the victim’s IP address does not match, the empty RTF file will be sent as a decoy.

The malicious payload is an RTF file that weaponizes CVE-2017-11882, a memory corruption vulnerability in the equation editor, launches a shellcode-based loader that runs the Stealerbot malware.

Cybersecurity

According to Kaspersky, Stealerbot is a .NET implant designed to drop additional malware, launch a reverse shell, and collect a wide range of data from compromised hosts such as screenshots, keystrokes, passwords, files, and more.

“Sidewinder has maintained a stable pace of operation without long-term inactivity, maintaining patterns that reflect organizational continuity and sustained intentions, demonstrating consistent activity over time,” the researchers said.

“A closer analysis of tactics, techniques, and procedures (TTPS) reveals high levels of control and accuracy, delivering malicious payloads only to carefully selected targets, often providing only a limited amount of time.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAWS default IAM role is known to allow for lateral movement and cross-service exploitation
Next Article South Loop Ventures will close Houston $21 million fund to build a local technology ecosystem
user
  • Website

Related Posts

Hazy Hawk Exploites DNS Records hijack CDC to hijack CDC, the corporate domain for malware delivery

May 20, 2025

Over 100 fake Chrome extensions found hijacking sessions, credential stealing, ad injections

May 20, 2025

AWS default IAM role is known to allow for lateral movement and cross-service exploitation

May 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Top tech startup funding news for today, May 20, 2025

Trump says we will put weapons in space as part of the “Golden Dome” plan | Military News

Microsoft Build 2025: All the big AI announcements you need to know

With fewer ordinances, seminaries have found ways to serve young professionals in other fields

Trending Posts

Trump says we will put weapons in space as part of the “Golden Dome” plan | Military News

May 20, 2025

Uganda confirms civilian military trial despite Supreme Court ruling | Court News

May 20, 2025

EU maintains radio-free Europe with emergency funds after Trump is cut | Donald Trump News

May 20, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top tech startup funding news for today, May 20, 2025

Microsoft Build 2025: All the big AI announcements you need to know

Beer 2.0: Meme Coin Brewing Something Big in Solana

Wall Street Ponke launches AI tools, learning hubs and over $300,000 in hours

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.