Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware

Posted on September 15, 2025September 15, 2025 By CWS

The eruption of widespread protests throughout Nepal in early September 2025 offered fertile floor for a classy marketing campaign orchestrated by the Sidewinder APT group.

As demonstrators mobilized towards authorities insurance policies and social media restrictions, menace actors exploited the turbulence to distribute malicious functions masquerading as respectable emergency companies.

Victims searching for reside updates or help have been enticed by lifelike impersonations of Nepalese authorities, solely to put in malware that siphoned delicate knowledge from each cellular and Home windows environments.

Sidewinder’s operation depends on a dual-pronged supply mechanism. On Android units, victims encounter phishing web sites spoofing the Nepalese Emergency Service login.

Spoofing the emergency service for cred phishing (Supply – StrikeReady)

As soon as credentials are entered, the positioning redirects to an APK obtain—sometimes named Gen_Ashok_Sigdel_Live.apk—which customers set up below the guise of accessing reside information.

Performing head of Nepal (Supply – StrikeReady)

In the meantime, Home windows customers obtain EmergencyApp.exe from a cloned Emergency Helpline portal (Determine 6). Each binaries request intensive permissions—file system entry, microphone, digicam—to facilitate knowledge exfiltration.

StrikeReady Labs analysts famous the group’s deliberate use of geopolitical occasions to maximise engagement, embedding the malicious payload inside decoy content material fetched from respected retailers resembling Al Jazeera.

APK decoy content material (Supply – StrikeReady)

These decoys lend credibility to the operation and assist the malware bypass cursory inspection by non-technical customers. As soon as put in, the cellular backdoor initializes a service that filters doc and picture recordsdata for exfiltration.

The Home windows variant operates equally, spawning background duties that harvest recordsdata with extensions like .docx, .pdf, and .xlsx.

An infection Mechanism and Permission Abuse

A better examination of the Android pattern reveals a multi-threaded FileUploadService class accountable for knowledge theft.

Examination of information theft filters in addition to infra (Supply – StrikeReady)

Upon execution, the service initializes an ExecutorService with a thread pool of fifteen staff. Every employee scans machine storage for recordsdata matching predefined doc and picture extensions:

public class FileUploadService extends Service {
non-public static remaining int THREAD_COUNT = 15;
non-public remaining Checklist docExts = Arrays.asList(“.txt”, “.pdf”, “.docx”, “.xlsx”);
non-public remaining Checklist imgExts = Arrays.asList(“.jpg”, “.png”);
non-public ExecutorService executorService;

@Override
public int onStartCommand(Intent intent, int flags, int startId) {
executorService = Executors.newFixedThreadPool(THREAD_COUNT);
scanAndUpload();
return START_STICKY;
}

non-public void scanAndUpload() {
for (String ext : docExts) {
// Launch duties to add matching recordsdata
executorService.submit(() -> uploadFiles(ext));
}
for (String ext : imgExts) {
executorService.submit(() -> uploadFiles(ext));
}
}
}

As soon as recordsdata are recognized, HTTP POST requests bundle them into multipart kind knowledge, utilizing a recognizable boundary marker (—-qwerty) that seems within the community seize.

pcap displaying ‘qwerty’ sig-able boundary (Supply – StrikeReady)

All stolen recordsdata are despatched to a C2 endpoint managed by Sidewinder. Persistence is maintained via Android’s foreground service notifications and Home windows autostart registry entries.

By leveraging legitimate-seeming person interfaces and abusing high-level permissions, Sidewinder achieves a stealthy an infection vector able to breaching enterprise and private environments alike.

Safety groups ought to monitor for recognized IOC domains (e.g., playservicess.com), suspicious APK installations, and anomalous outbound visitors containing multipart payloads.

Increase your SOC and assist your workforce defend what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:APT, Hackers, Leverage, Malware, Mobile, Nepal, Protests, Push, SideWinder, Windows

Post navigation

Previous Post: Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access
Next Post: 689,000 Affected by Insider Breach at FinWise Bank

Related Posts

MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Cyber Security News
How Businesses Prevent Credential Theft with Early Phishing Detection Cyber Security News
WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution Cyber Security News
New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack Cyber Security News
Conducting Risk Assessments That Drive Business Value Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs
  • Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle
  • 689,000 Affected by Insider Breach at FinWise Bank
  • Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware
  • Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs
  • Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle
  • 689,000 Affected by Insider Breach at FinWise Bank
  • Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware
  • Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News