SideWinder APT Targets Hospitality Entities Across Asia, Middle East, Europe and Africa

Executive Summary

Cybersecurity researchers at SecureList by Kaspersky have uncovered a sophisticated cyber espionage campaign by SideWinder, an Advanced Persistent Threat group targeting hospitality and consulting organizations, among others, across South and Southeast Asia, the Middle East, Europe, and Africa.

The group relies on spear-phishing emails containing malicious documents that exploit CVE-2017-11882, a dated but effective Microsoft Office vulnerability, to deploy StealerBot, a modular post-exploitation toolkit.

Community Impact

The retail and hospitality industries are increasingly being targeted as part of SideWinder’s expanded espionage operations, with evidence of attacks against hotels, real estate agencies, and consulting firms, among others. With the hospitality sector handling large amounts of personal and financial data, RH-ISAC Core Member Organizations should ingest the intelligence included in this report, the original SecureList report, linked above, and review and ingest the Indicators of Compromise, included below.

Analysis

SideWinder’s attack chains primarily rely on spear-phishing emails containing malicious DOCX documents that exploit CVE-2017-11882, an 8-year-old memory corruption vulnerability in Microsoft Office’s Equation Editor. When executed, the malicious document triggers remote template injection, fetching an RTF file from an attacker-controlled server. This RTF exploit executes embedded shellcode, which downloads and runs JavaScript code using the mshtml.RunHTMLApplication function, which in turn, employs a .NET downloader named ModuleInstaller to ultimately launch StealerBot, an advanced cyberespionage tool designed for data exfiltration, system compromise, and the facilitation of further malicious activities.

Indicators of Compromise

SecureList has provided the following Indicators of Compromise. RH-ISAC Core Members are encouraged to ingest the following Indicators below at the earliest feasible opportunity:

Microsoft Office Documents:

e9726519487ba9e4e5589a8a5ec2f933
 d36a67468d01c4cb789cd6794fb8bc70
 313f9bbe6dac3edc09fe9ac081950673
 bd8043127abe3f5cfa61bd2174f54c60
 e0bce049c71bc81afe172cd30be4d2b7
 872c2ddf6467b1220ee83dca0e118214
 3d9961991e7ae6ad2bae09c475a1bce8
 a694ccdb82b061c26c35f612d68ed1c2
 f42ba43f7328cbc9ce85b2482809ff1c

Backdoor Loader:

0216ffc6fb679bdf4ea6ee7051213c1e
 433480f7d8642076a8b3793948da5efe

Domains:

pmd-office[.]info
 modpak[.]info
 dirctt888[.]info
 modpak-info[.]services
 pmd-offc[.]info
 dowmloade[.]org
 dirctt888[.]com
 portdedjibouti[.]live
 mods[.]email
 dowmload[.]co
 downl0ad[.]org
 d0wnlaod[.]com
 d0wnlaod[.]org
 dirctt88[.]info
 directt88[.]com
 file-dwnld[.]org
 defencearmy[.]pro
 document-viewer[.]info
 aliyum[.]email
 d0cumentview[.]info
 debcon[.]live
 document-viewer[.]live
 documentviewer[.]info
 ms-office[.]app
 ms-office[.]pro
 pncert[.]info
 session-out[.]com
 zeltech[.]live
 ziptec[.]info
 depo-govpk[.]com
 crontec[.]site
 mteron[.]info
 mevron[.]tech
 veorey[.]live
 mod-kh[.]info

More Recent Blog Posts