Date | Title | Reference |
---|---|---|
2023-Jan-11 | Calling from the Underground: An alternative way to penetrate corporate networks | Blog |
2023-Feb-01 | Uncovering LockBit Black’s Attack Chain and Anti-forensic activity | Seqrite Quick Heal |
2023-Mar-15 | SideCopy Continues to Target Indian Defense Organization | Whitepaper IOCs |
2023-May-02 | Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions | Blog Whitepaper |
2023-Jun-15 | Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence | Blog Whitepaper |
2023-Sep-06 | New Warp Malware drops modified Stealerium Infostealer | Blog Whitepaper |
2023-Nov-06 | SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT | Blog TheHackerNews |
2023-Dec-21 | Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration | Blog TheHackerNews |
2024-Apr-24 | Pakistani APTs Escalate Attacks on Indian Gov. Seqrite Labs Unveils Threats and Connections | Blog |
Date | Conference | Title | Reference |
---|---|---|---|
2022-Dec-01 | AVAR 2022 Singapore | Indian Power Sector targeted with latest LockBit 3.0 variant | Abstract |
2023-Oct-07 | c0c0n 2023 Kochi | Evasion Tactics of SideCopy & APT36: Persistently targeting the Indian Defence Sector | Post-1 Post-2 |
2024-Apr-24 | Botconf 2024 France | Warp’s Enigma: Unraveling a Sophisticated Golang Malware Ecosystem that drops modified Stealerium | Abstract |
2024-Oct-03 | Virus Bulletin 2024 Ireland | Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study | Abstract |
Date | Publisher | Title | Reference |
---|---|---|---|
2022-Dec-02 | Springer | Intruder Detection and Tracking Using Computer Vision and IoT | Abstract |