Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

APT28 deploys contracts with Beard Shell Malware in Ukraine using signal chat

Clinical tests to improve animal health

China-related salt typhoons exploit critical Cisco vulnerabilities to target Canadian communications

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Pakistan-linked hackers expand Indian targets with curlback rats and spark rats
Identity

Pakistan-linked hackers expand Indian targets with curlback rats and spark rats

userBy userApril 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 14, 2025Ravi LakshmananCyber ​​Attacks/Malware

Hackers linked to Pakistan

Threat actors with ties to Pakistan have been observed to target different sectors in India, with a variety of remote access trojans, including Xeno Rat, Spark Rat and a previously undocumented family of malware called Curlback Rat.

The activity, detected by Seqrite in December 2024, targets Indian groups under the Ministry of Railways, Oil and Gas, and the Ministry of Foreign Affairs, marking an expansion of the targeting footprint of hacking crews across government, defense, maritime sectors and universities.

“One of the notable changes in recent campaigns is the transition from using HTML application (HTA) files to adopting Microsoft installer (MSI) packages as a major staging mechanism,” said security researcher Sathwik Ram Prakki.

Sidecopy is suspected to be a subcluster within the Transparent Tribe (aka APT36) that has been active since at least 2019. It was named after it mimics the attack chain associated with another threat actor called SideWinder and provides its own payload.

Cybersecurity

In June 2024, Seqrite highlighted that Sidecopy uses obfuscated HTA files, leveraging previously observed techniques in Sidewinder attacks. I also found that the file contains a reference to the URL hosting the RTF file that was identified as being used by SideWinder.

An attack that reached its peak in the Action Rat and Reversalat deployment, two known malware families due to side copying, and several other payloads including Cheex for stealing documents and images, USB copiers, sweep data from attached drives, and .NET-based GETA rats that can run 30 commands sent from remote servers.

The Rat is equipped to steal both Firefox and Chromium-based browser data for all accounts, profiles, and cookies, which are features borrowed from Asyncrat.

“The APT36 focus is primarily on Linux systems, but SideCopy targets Windows Systems and adds new payloads to its arsenal,” Seqrite said at the time.

Curlback rat and spark rat

The latest findings demonstrate the continued maturation of hacking groups, leveraging email-based phishing as a distribution vector for malware. These email messages include a variety of lure documents, ranging from the list of railway staff’s holiday, to cybersecurity guidelines issued by public sector businesses called Hindustan Petroleum Corporation Limited (HPCL).

Given its ability to target both Windows and Linux systems, a cluster of activities is particularly noteworthy, leading to the deployment of a cross-platform remote access Trojan known as Spark Rat, which allows it to gather system information, download files from the host, execute arbitration orders, expand privileges, and list user accounts.

Cybersecurity

A second cluster has been observed using decoy files as a way to start a multi-step infection process that drops a custom version of Xeno RAT that incorporates basic string manipulation methods.

“This group has shifted from using HTA files to MSI packages as the main staging mechanism, continuing advanced techniques such as DLL sideloading, reflective loading and AES decoding through PowerShell,” the company said.

“In addition, along with the newly identified deployment of Curlback Rats, we are leveraging customized open source tools such as Xeno Rat and Spark Rat. Compromised domains and fake sites are used for qualification phishing and payload hosting, highlighting the group’s ongoing ability to enhance persistence and Evard detection.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSANSFIRE 2025 | Cybersecurity Training
Next Article How Earth Observation Technology is Transforming Disaster Relief
user
  • Website

Related Posts

APT28 deploys contracts with Beard Shell Malware in Ukraine using signal chat

June 24, 2025

China-related salt typhoons exploit critical Cisco vulnerabilities to target Canadian communications

June 24, 2025

The Digital Twin Revolution: Reshaping Industry 4.0

June 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

APT28 deploys contracts with Beard Shell Malware in Ukraine using signal chat

Clinical tests to improve animal health

China-related salt typhoons exploit critical Cisco vulnerabilities to target Canadian communications

Court filings reveal early work of Openai and IO on AI devices

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.