SideCopy

Description

(Seqrite) Operation SideCopy is active from early 2019, till date. This cyber-operation has been only targeting Indian defence forces and armed forces personnel. Malware modules seen are constantly under development and updated modules are released after a reconnaissance of victim data. Actors are keeping track of malware detections and updating modules when detected by AV. Almost all CnC belongs to Contabo GmbH and server names are similar to machine names found in the Transparent Tribe report. This threat actor is misleading the security community by copying TTPs that point at SideWinder, Rattlesnake APT group. We suspect this threat actor has links with Transparent Tribe, APT 36 APT group.

Names

NameName-Giver
SideCopySeqrite
UNC2269Mandiant
White Dev 55PWC
Mocking DracoPalo Alto

Country

Motivation

  • Information theft and espionage

First Seen

2019

Observed Countries

Tools

Operations

Counter Operations

Information

Mitre Attack

Other Information

Uuid

9fd705e5-6b3c-4e0b-b21c-ebb9dc854fc3

Last Card Change

2025-06-27