The SideWinder threat group—also known as Rattlesnake, Razor Tiger, T-APT-04, APT-C-17, Hardcore Nationalist, and BabyElephant—has launched a highly targeted espionage campaign across South and Southeast Asia, primarily focusing on diplomatic entities in Sri Lanka, Pakistan, Bangladesh, and India.
Discovered in March 2025, this ClickOnce-based attack chain represents a major evolution in SideWinder’s operational techniques, replacing its earlier reliance on Microsoft Word exploits. The campaign uses malicious PDFs and deceptive “Adobe Reader update” prompts that trigger a multi-stage infection chain, delivering custom spyware tools such as ModuleInstaller and StealerBot.
This operation blends social engineering, software impersonation, and geofenced payload delivery to infiltrate diplomatic networks, exfiltrate classified information, and evade detection. The geopolitical themes of the lures—ranging from defense policy and religious affairs to government correspondence—underscore the group’s continued focus on intelligence collection across South Asia.
Between March and September 2025, SideWinder executed a series of phishing campaigns designed to exploit regional trust and official workflows. The attacks were first detected targeting a European embassy in New Delhi, followed by incidents impacting government and diplomatic bodies in Sri Lanka, Pakistan, and Bangladesh.
Each wave of attacks used locally themed lures to increase credibility:
The campaign exploited CVE-2017-0199, a known Microsoft Word vulnerability, in parallel with new PDF-based infection vectors. Victims were enticed to download a fake Adobe Reader update, which silently retrieved a signed ClickOnce application masquerading as legitimate software.
Behind this facade, the application sideloaded a tampered DEVOBJ.dll, initiating a multi-stage payload chain:
SideWinder demonstrated advanced evasion techniques including:
This meticulous execution suggests strong operational discipline, with each campaign fine-tuned to align with regional political developments.
SHA256 Hashes:
06da4a5755a81785f68caf75cca2b7a41c3aa9b4af24d2bb93964abf87343869
09b96a2426f8ddcc20aa58a72ad147d410525f1a4a42835b7ece126211537b3b
0f407b9b1cffa88edfe5a439f316dd41eea2fc47ba24a8dd986a6ffe520cb66b
32febd24765e996c8f01f77f02b02af3e35914ea215f98fcf2054a15a5bb0262
341a21538b90c87b40e150967519a695f2c339befde232e2f3cd85caf6885803
… (additional hashes listed in full report)
Domains:
mos-gov-bd[.]snagdrive[.]com
mofa-gov-bd[.]filenest[.]live
www-treasury-gov-lk[.]snagdrive[.]com
pimec-paknavy[.]updates-installer[.]store
hajjtraining2025[.]moragovt[.]net
adobe[.]pdf-downlod[.]com
cabinet-gov-pk[.]dytt888[.]net
hajjmedicalteam[.]adobeglobal[.]com
URLs:
hxxps[:]//adobe[.]pdf-downlod[.]com/updates-b1139620/adobe-reader
hxxps[:]//pubad-gov-lk[.]download-doc[.]net/09c3c5c1/adobe-reader
hxxps[:]//mofa-gov-bd[.]filenest[.]live/48686010/adobe-reader
hxxps[:]//pimec-paknavy[.]updates-installer[.]store/1/7ab8fb0a/adobe-reader
hxxps[:]//hajjmedicalteam[.]adobeglobal[.]com/bangladesh/73439525/adobe-reader
Emails:
ds.plann2@mos[.]gov[.]bd[.]pk-mail[.]org
p2@mofa[.]gov[.]bd[.]pk-mail[.]org
js.admn@pmo[.]gov[.]pk-mail[.]org
asresearch@mofa[.]gov[.]bd[.]pk-mail[.]org
| Tactic | Technique | Technique ID |
|---|---|---|
| Initial Access | Phishing / Spearphishing Attachment | T1566, T1566.001 |
| Execution | User Execution – Malicious File | T1204, T1204.002 |
| Persistence | Boot or Logon Autostart Execution | T1547, T1547.001 |
| Privilege Escalation | Access Token Manipulation | T1134 |
| Defense Evasion | Obfuscated or Encrypted Payloads | T1027, T1027.013 |
| Discovery | System and Network Discovery | T1082, T1016 |
| Collection | Data from Local System | T1005 |
| Exfiltration | Exfiltration Over C2 Channel | T1041 |
| Command and Control | Application Layer Protocol – Web Protocols | T1071.001 |
| Resource Development | DLL Hijacking / Hijack Execution Flow | T1574, T1574.001 |
Get through updates and upcoming events, and more directly in your inbox