APT36 and SideCopy Launch Cross-Platform RATs

Cybersecurity researchers uncovered ongoing espionage campaigns. APT36 and SideCopy target Indian defense and government entities. They use cross-platform remote access trojans to steal data and maintain access.

Targeted Sectors and Goals

Attackers focus on defense, government, and strategic organizations. They also hit policy, research, and critical infrastructure groups. For example, they use defense-themed lures to trick victims. Therefore, they gain long-term presence in sensitive networks.

These campaigns show refinement over time. The actors expand to both Windows and Linux. Moreover, they improve stealth with memory-resident techniques. This keeps operations below detection thresholds.

Phishing emails start most attacks. Messages contain malicious attachments or links. Victims click and reach attacker-controlled sites. These deliver Windows shortcuts, ELF binaries, or PowerPoint add-ins. The files launch multi-stage processes. They drop trojans quietly. Additionally, compromised legitimate domains host payloads. This blends malicious traffic with normal activity.

Windows-Focused Attac Chain

One chain uses malicious LNK files. These invoke mshta.exe to run HTA files. The HTA decrypts embedded DLLs. Next, it writes a decoy PDF to disk and connects to a C2 server. The PDF opens to distract the victim. Meanwhile, malware checks for security tools. It adapts persistence methods accordingly. Finally, it deploys Geta RAT on the system.

Geta RAT Capabilities

Geta RAT provides strong remote control. It collects system info and lists processes. It terminates apps and gathers credentials. Moreover, it captures screenshots and manipulates clipboard data.

The trojan handles files and runs shell commands. It harvests USB device data too. Therefore, attackers extract sensitive information steadily. This supports ongoing espionage efforts. A parallel campaign targets Linux systems. It starts with a Go binary. The binary downloads a shell script. This script drops Python-based Ares RAT.

Ares RAT runs many commands. It harvests data and executes Python scripts. For instance, it follows attacker instructions remotely. Consequently, Linux servers face similar risks as Windows machines.

DeskRAT Through Rogue Add-Ins

Another chain uses fake PowerPoint add-ins. Macros inside fetch DeskRAT from remote servers. This Golang malware establishes persistence. It enables outbound C2 communication quietly. DeskRAT supports file operations and reconnaissance. It blends with legitimate processes. Therefore, defenders struggle to spot it early.

These groups refine their toolkit constantly. They combine known malware with new delivery vectors. For example, they target trusted regional infrastructure. This increases success against Indian entities.

The campaigns remain espionage-focused. They prioritize stealth and persistence. Consequently, long-term access becomes the main goal.

Prevention Strategies

Organizations can block these threats with strong layered defenses. First, patch systems regularly and disable unnecessary macros in Office files. Train staff to verify email attachments carefully. Moreover, deploy continuous monitoring to detect unusual outbound connections, process injections, and memory-resident activity early.

Use strict application controls to limit unknown binaries. Enable behavioral analysis for script execution. These steps significantly reduce the risk of successful RAT infections from APT36 and SideCopy campaigns.

Sleep well, we got you covered.

Scroll to Top