Sidewinder, a well known superior persistent menace (APT) group, has tailored its ways to use the continued protests in Nepal, deploying a coordinated marketing campaign of cell and Home windows malware alongside credential phishing.
By masquerading as revered nationwide establishments and figures, the group seeks to reap delicate information from customers monitoring the nation’s political turmoil.
The protests, ignited by a authorities ban on social media and accusations of corruption, have led to dozens of fatalities and the ousting of key management, creating fertile floor for social engineering exploits.
In a single marketing campaign strand, Sidewinder operators crafted a phishing lure impersonating the Nepalese Emergency Service.
Victims obtain messages purportedly from emergency responders, full with a convincing electronic mail template and a spoofed area, prompting customers to enter their credentials on a fraudulent portal.
As soon as credentials are submitted, attackers achieve entry to private and company accounts, that are then leveraged for additional compromise.
Concurrently, Sidewinder rolled out an Android malware pressure by exploiting the persona of Normal Ashok Sigdel, the appearing head of Nepal as of September 2025.
Customers in search of updates or statements from the final are as an alternative directed to put in an APK named Gen_Ashok_Sigdel_Live.apk.
The decoy app shows legitimate-looking information feeds and stay video streams, masking its nefarious conduct.

Upon granting requested permissions, the malware begins silently harvesting paperwork, photos, and different information from the system, exfiltrating them to a command-and-control endpoint at playservicess.com.
Reverse-engineering the APK reveals an IDA-style view of the malware’s code, illustrating routines for file enumeration and encrypted information switch.
Home windows Malware and Parallel Android Samples
Sidewinder Home windows-focused element employs a dropper named EmergencyApp.exe, which mimics an official Nepalese emergency utility.

When executed, it installs a backdoor that scans for high-value information in consumer directories and system configurations.
In parallel, one other Android pattern, Emergency_Help.apk, capabilities equally to Gen_Ashok_Sigdel_Live.apk, broadening the group’s attain throughout a number of cell consumer segments.
Victims of those payloads usually first encounter a pretend “Emergency Helpline” web site internet hosting hyperlinks to each the Android APKs and the Home windows EXE.
Community captures from contaminated environments reveal signature boundaries marked “—-qwerty” utilized in multi-part HTTP exfiltration posts. These forensic artifacts could be invaluable for incident responders in search of to disrupt ongoing information theft.
Looking Indicators
Defenders investigating potential Sidewinder infections ought to be aware a number of key artifacts. For cell compromises, investigators might discover utility set up logs referencing “Gen_Ashok_Sigdel_Live.apk” or “Emergency_Help.apk.” On Home windows hosts, Transportable Database (PDB) paths comparable to:
textual contentC:UsersasdfDesktop9x64ReleaseConsoleApplication1.pdb
can level to growth leftovers embedded inside EmergencyApp.exe. Moreover, webserver paths like /ghijkl/ghijkl/index.php
function staging factors for exfiltrated information.
Community defenders ought to configure alerts for HTTP visitors containing “boundary=—-qwerty” and monitor DNS requests to playservicess.com.
Organizations with personnel monitoring Nepal’s political state of affairs should increase consciousness round focused phishing lures and implement strict verification processes earlier than putting in functions.
Implementing cell system administration (MDM) options to limit unknown APK installations and using endpoint detection and response (EDR) instruments on Home windows belongings can considerably cut back threat.
Common menace intelligence updates and consumer training campaigns about rising Sidewinder ways will bolster resilience in opposition to this opportunistic APT.
Discover this Story Attention-grabbing! Observe us on LinkedIn and X to Get Extra On the spot Updates.