Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware

Posted on September 15, 2025September 15, 2025 By CWS

The eruption of widespread protests throughout Nepal in early September 2025 offered fertile floor for a classy marketing campaign orchestrated by the Sidewinder APT group.

As demonstrators mobilized towards authorities insurance policies and social media restrictions, menace actors exploited the turbulence to distribute malicious functions masquerading as respectable emergency companies.

Victims searching for reside updates or help have been enticed by lifelike impersonations of Nepalese authorities, solely to put in malware that siphoned delicate knowledge from each cellular and Home windows environments.

Sidewinder’s operation depends on a dual-pronged supply mechanism. On Android units, victims encounter phishing web sites spoofing the Nepalese Emergency Service login.

Spoofing the emergency service for cred phishing (Supply – StrikeReady)

As soon as credentials are entered, the positioning redirects to an APK obtain—sometimes named Gen_Ashok_Sigdel_Live.apk—which customers set up below the guise of accessing reside information.

Performing head of Nepal (Supply – StrikeReady)

In the meantime, Home windows customers obtain EmergencyApp.exe from a cloned Emergency Helpline portal (Determine 6). Each binaries request intensive permissions—file system entry, microphone, digicam—to facilitate knowledge exfiltration.

StrikeReady Labs analysts famous the group’s deliberate use of geopolitical occasions to maximise engagement, embedding the malicious payload inside decoy content material fetched from respected retailers resembling Al Jazeera.

APK decoy content material (Supply – StrikeReady)

These decoys lend credibility to the operation and assist the malware bypass cursory inspection by non-technical customers. As soon as put in, the cellular backdoor initializes a service that filters doc and picture recordsdata for exfiltration.

The Home windows variant operates equally, spawning background duties that harvest recordsdata with extensions like .docx, .pdf, and .xlsx.

An infection Mechanism and Permission Abuse

A better examination of the Android pattern reveals a multi-threaded FileUploadService class accountable for knowledge theft.

Examination of information theft filters in addition to infra (Supply – StrikeReady)

Upon execution, the service initializes an ExecutorService with a thread pool of fifteen staff. Every employee scans machine storage for recordsdata matching predefined doc and picture extensions:

public class FileUploadService extends Service {
non-public static remaining int THREAD_COUNT = 15;
non-public remaining Checklist docExts = Arrays.asList(“.txt”, “.pdf”, “.docx”, “.xlsx”);
non-public remaining Checklist imgExts = Arrays.asList(“.jpg”, “.png”);
non-public ExecutorService executorService;

@Override
public int onStartCommand(Intent intent, int flags, int startId) {
executorService = Executors.newFixedThreadPool(THREAD_COUNT);
scanAndUpload();
return START_STICKY;
}

non-public void scanAndUpload() {
for (String ext : docExts) {
// Launch duties to add matching recordsdata
executorService.submit(() -> uploadFiles(ext));
}
for (String ext : imgExts) {
executorService.submit(() -> uploadFiles(ext));
}
}
}

As soon as recordsdata are recognized, HTTP POST requests bundle them into multipart kind knowledge, utilizing a recognizable boundary marker (—-qwerty) that seems within the community seize.

pcap displaying ‘qwerty’ sig-able boundary (Supply – StrikeReady)

All stolen recordsdata are despatched to a C2 endpoint managed by Sidewinder. Persistence is maintained via Android’s foreground service notifications and Home windows autostart registry entries.

By leveraging legitimate-seeming person interfaces and abusing high-level permissions, Sidewinder achieves a stealthy an infection vector able to breaching enterprise and private environments alike.

Safety groups ought to monitor for recognized IOC domains (e.g., playservicess.com), suspicious APK installations, and anomalous outbound visitors containing multipart payloads.

Increase your SOC and assist your workforce defend what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:APT, Hackers, Leverage, Malware, Mobile, Nepal, Protests, Push, SideWinder, Windows

Post navigation

Previous Post: Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access
Next Post: 689,000 Affected by Insider Breach at FinWise Bank

Related Posts

New HTTP Smuggling Attack Technique Let Hackers Inject Malicious Requests Cyber Security News
1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities Cyber Security News
WordPress Admins Beware! Fake Cache Plugin that Steals Admin Logins Cyber Security News
New Frontiers In Identity-Based Access Control Cyber Security News
Storm-0249 Abusing EDR Process Via Sideloading to Hide Malicious Activity Cyber Security News
Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Echo Raises $35 Million in Series A Funding

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Echo Raises $35 Million in Series A Funding

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark