Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SideWinder APT Hackers Attacking Indian Entities by Masquerading as the Income Tax Department of India

SideWinder APT Hackers Attacking Indian Entities by Masquerading as the Income Tax Department of India

Posted on December 22, 2025December 22, 2025 By CWS

The marketing campaign is run by the SideWinder superior persistent menace group and goals to plant a silent Home windows backdoor on sufferer machines.

As soon as energetic, the malware can steal information, seize knowledge and provides distant management to the attacker.

Every assault begins with a tax-themed e mail that urges the sufferer to evaluate an inspection doc.

The message features a surl.li hyperlink that results in a pretend tax portal at gfmqvip.vip, which copies the look of the true Revenue Tax website.

Phishing E mail Impersonating the Revenue Tax Division of India (Supply – Zscaler)

The portal then pushes an Inspection.zip file that’s saved on store10.gofile.io.

Zscaler analysts recognized this chain whereas looking for odd surl.li visitors inside massive Indian networks.

They noticed customers transfer from the brief hyperlink to the pretend tax web page, obtain Inspection.zip after which join out to recognized SideWinder servers.

Their work reveals how a easy trying tax e mail can result in long run entry inside delicate Indian programs. The downloaded Inspection.zip archive holds three key information and marks the beginning of the entire technical breakdown.

It accommodates a signed Microsoft Defender binary renamed as Inspection Doc Overview.exe however in reality SenseCE.exe, a malicious MpGear.dll library, and a decoy certificates file DMRootCA.crt.

Revenue Tax Division of India Phishing Web page (Supply – Zscaler)

When the person runs the “evaluate” program, Home windows masses MpGear.dll from the identical folder, a DLL facet‑loading trick that lets attacker code run inside a trusted course of.

Checks

Earlier than contacting the command server, MpGear.dll checks that the host is an actual goal and never a sandbox.

Sufferer Timezone Checks for Superior Geofencing (Supply – Zscaler)

It calls timeapi.io and worldtimeapi.org to learn the time zone and solely continues if the worth matches South Asia zones similar to UTC+5:30.

A typical config file can appear like this:-

C2=180.178.56.230

It additionally sleeps for about three and a half minutes to evade fast scans and appears at working processes earlier than loading the subsequent stage from the web.

Within the ultimate stage, MpGear.dll reaches out to eight.217.152.225 to fetch a small loader known as 1bin, drops a resident agent mysetup.exe within the C: folder, and writes a management file like YTSysConfig.ini that shops the command server 180.178.56.230 and different flags.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT, Attacking, Department, Entities, Hackers, Income, India, Indian, Masquerading, SideWinder, Tax

Post navigation

Previous Post: Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator
Next Post: Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Related Posts

Critical Western Digital My Cloud NAS Vulnerability Allows Remote Code Execution Critical Western Digital My Cloud NAS Vulnerability Allows Remote Code Execution Cyber Security News
Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Cyber Security News
New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment Cyber Security News
5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them 5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them Cyber Security News
Ubuntu’s Kernel Vulnerability Let Attackers Escalate Privileges and Gain Root Access Ubuntu’s Kernel Vulnerability Let Attackers Escalate Privileges and Gain Root Access Cyber Security News
Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News