Kaspersky researchers have tracked a shift in focus for the infamous advanced persistent threat (APT) group SideWinder toward nuclear power facilities in South Asia, marking a significant escalation in targeted espionage. The threat actor has simultaneously expanded operations across Africa, Southeast Asia and parts of Europe.
Kaspersky’s Global Research and Analysis Team (GReAT) has documented a concerning two-pronged threat from the SideWinder APT group, which now shows a heightened focus on nuclear power plants and energy facilities across South Asia. This nuclear pivot runs parallel to the group’s geographic expansion beyond its conventional arenas.
Active since at least 2012, SideWinder has historically targeted government, military and diplomatic entities. The group has broadened its victim profile to include maritime infrastructure and logistics companies throughout Southeast Asia, while setting fresh sights on nuclear sector targets. Kaspersky researchers noted a spike in attacks aimed at nuclear power agencies that use spear-phishing emails and malicious documents laden with industry-specific terminology.
Tracking SideWinder across 15 countries and three continents, Kaspersky observed numerous attacks in Djibouti before the group shifted focus to Egypt and launched additional operations in Mozambique, Austria, Bulgaria, Cambodia, Indonesia, the Philippines and Vietnam. Diplomatic entities in Afghanistan, Algeria, Rwanda, Saudi Arabia, Türkiye and Uganda have also been targeted, further illustrating SideWinder’s move well beyond South Asia.
“What we’re witnessing is not just a geographic expansion but a strategic evolution in SideWinder’s capabilities and ambitions,” said Vasily Berdnikov, lead security researcher at Kaspersky’s GReAT. “They can deploy updated malware variants with remarkable speed after detection, which transforms the threat landscape from reactive to nearly real-time combat.”
Despite relying on an older Microsoft Office vulnerability (CVE-2017-11882), SideWinder leverages rapid modifications to its toolset for evading detection. In targeting nuclear infrastructure, the group crafts convincing spear-phishing emails that appear to concern regulatory or plant-specific matters. Once opened, these documents initiate an exploitation chain that can grant attackers access to nuclear facilities’ operational data, research projects and personnel details.
Kaspersky protects organizations from such attacks through multiple security layers, including vulnerability management solutions, early-stage attack prevention, real-time threat detection with automated response and continuously updated detection rules aligned with SideWinder’s evolving malware.
The full technical analysis of SideWinder's latest operations is available on Securelist.com.
To help organizations protect their critical infrastructure against sophisticated targeted attacks, Kaspersky security experts recommend the following measures:
- Implement comprehensive patch management. Kaspersky Vulnerability Assessment and Patch Management provides automated vulnerability detection and patch distribution to eliminate security gaps in your infrastructure.
- Deploy multi-layered security solutions with real-time threat detection capabilities. Kaspersky Next XDR Expert aggregates and correlates data from multiple sources using machine-learning technologies for effective threat detection and automated response to sophisticated attacks.
- Conduct regular cybersecurity awareness training for employees, with a special focus on recognizing sophisticated spear-phishing attempts.
About the Global Research & Analysis Team
Established in 2008, Global Research & Analysis Team (GReAT) operates at the very heart of Kaspersky, uncovering APTs, cyber-espionage campaigns, major malware, ransomware and underground cyber-criminal trends across the world. Today GReAT consists of 35+ experts working globally – in Europe, Russia, Latin America, Asia and the Middle East. Talented security professionals provide company leadership in anti-malware research and innovation, bringing unrivaled expertise, passion and curiosity to the discovery and analysis of cyberthreats.