Seqrite Discovers Cyber Attacks on Indian Critical Infrastructure by Cross-Border Threat Actors

Published:

Seqrite Exposes Sophisticated Cyber Campaigns Targeting Indian Government Entities

In a significant revelation, Seqrite, the enterprise arm of Quick Heal Technologies Limited, has unveiled a series of sophisticated cyber campaigns aimed at critical Indian government entities. These advanced persistent threats (APTs), allegedly orchestrated by multiple Pakistan-based threat actors, represent a marked escalation in cyber operations targeting India’s defense and infrastructure sectors.

The Threat Landscape

The research conducted by the APT team at Seqrite Labs has uncovered a complex web of interconnected APT groups, including Transparent Tribe (APT36), SideCopy, and RusticWeb. These groups have been observed sharing infrastructure, tactics, and malware components, indicating an unprecedented level of coordination among these actors. This convergence of tactics signifies a new chapter in the cyber threat landscape, necessitating a reassessment of cybersecurity strategies at the highest levels of government and critical infrastructure.

Targeted Entities

The campaigns have specifically targeted vital components of India’s national security, including the Indian Air Force, shipyards, and ports. This focus on strategic assets underscores the seriousness of the threat posed by these cyber actors. The implications of such attacks could be far-reaching, potentially compromising national security and disrupting critical operations.

Technical Analysis of Malware

Seqrite’s research team conducted an in-depth technical analysis of the malware utilized in these campaigns. They discovered that the attackers were actively testing their stager evasion techniques against antivirus solutions at various locations in Pakistan. This level of sophistication highlights the attackers’ commitment to circumventing security measures.

Moreover, victim traffic from India was observed being routed through command and control (C2) servers located in Germany, with corroboration from Team Cymru. This routing through IPsec protocol from Pakistani IP addresses further emphasizes the transnational nature of these cyber threats.

Social Engineering Tactics

One of the most alarming aspects of these campaigns is the sophisticated social engineering tactics employed by the APT groups. According to the Seqrite report, the attackers leveraged themes such as salary increments, naval project reports, and government documents as lures. Many of these decoys were based on publicly available documents, showcasing the attackers’ efforts to create convincing pretexts for their phishing campaigns. This manipulation of information highlights the need for heightened awareness and training among personnel in critical sectors.

Convergence of APT Groups

A key finding of the investigation was the discovery of open directories hosting malware linked to both Transparent Tribe and SideCopy. Researchers identified a single-domain hosting payload for both groups, targeting Windows and Linux environments respectively. This overlap, along with shared command and control infrastructure, strongly suggests a convergence of operations among these previously distinct threat actors.

The sophistication of these campaigns is further illustrated by SideCopy’s use of advanced evasion techniques. The group was observed employing updated HTML Application (HTA) files, similar to those used by the SideWinder APT group, to evade detection. Additionally, new payloads were introduced, including a tool called Cheex for document and image theft, a USB copier for exfiltrating files from attached drives, and deployments of the FileZilla application and SigThief scripts.

Novel Malware Variants

Seqrite’s analysis also uncovered several novel malware variants. A new .NET-based payload named Geta RAT was identified, incorporating browser-stealing functionality from Async RAT. Another variant, Action RAT, was observed being side-loaded by charmap.exe, marking a deviation from previously used system binaries. These findings underscore the evolving nature of cyber threats and the need for continuous monitoring and adaptation in cybersecurity measures.

Conclusion

The revelations from Seqrite highlight a concerning trend in the cyber threat landscape facing India. The coordinated efforts of multiple APT groups targeting critical infrastructure and government entities demand urgent attention and action. As cyber threats become increasingly sophisticated, it is imperative for organizations and government bodies to reassess their cybersecurity strategies, enhance their defenses, and foster a culture of vigilance and awareness among personnel. The stakes are high, and the need for robust cybersecurity measures has never been more critical.

For further insights, you can read about Quick Heal Technologies’ 37% revenue growth in Q1 FY25 and the ongoing efforts by the government to bolster cybersecurity measures.

Related articles

Recent articles