SideCopy: How an Intelligence Service Uses Phishbait



Intelligence Service Uses PhishbaitResearchers at Malwarebytes offer more details on a spear phishing campaign run by a Pakistani threat actor that’s come to be known as “SideCopy.” The campaign was first reported by Facebook earlier this year.

“The SideCopy APT has been actively targeting government and military officials in South Asia,” Malwarebytes says. “The group mainly uses archived files to target victims in spam or spear phishing campaigns. The archive files usually have an embedded lnk, Office or Trojanized application that are used to call mshta to download and execute an hta file. The hta files perform fileless payload execution to deploy one of the RATs associated with this actor such as AllaKore or Action Rat.”

The threat actor is using targeted phishing emails as well as more generic lures to target individuals in Afghanistan and India.

The targeted phishbait is designed to attract specific officials. “These lures are specially crafted and designed to target specific victims,” Malwarebytes says. “We believe this category is very well customized to target government or military officials.”

The generic lures include “romantic lures” with pictures of women to prompt users into opening the malicious attachments. The researchers believe that these emails were “used in spam campaigns to collect emails and credentials to help the actor perform their targeted attacks.”

Malwarebytes adds that the campaign has been successful at stealing information from government targets.

“The SideCopy APT was able to steal several Office documents and databases associated with the Government of Afghanistan,” the researchers write. “As an example, the threat actor exfiltrated Diplomatic Visa and Diplomatic ID cards from the Ministry of Foreign Affairs of Afghanistan database, as well as the Asset Registration and Verification Authority database belonging to the General Director of Administrative Affairs of Government of Afghanistan. They also were able to exfiltrate the ID cards of several Afghani government officials.”

New-school security awareness training can enable your employees to thwart targeted social engineering attacks.

Malwarebytes has the story.


Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/phishing-security-test-offer

Topics: Spear Phishing



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews