Skip to content
Threat Feed
medium advisory

RagaSerpent 'Tax Audit' Campaign Targeting Multiple Countries

The RagaSerpent cluster, also known as SideWinder-Adjacent, is conducting targeted attacks across multiple countries between 2025 and 2026, associated with a 'Tax Audit' themed campaign.

The RagaSerpent cluster, sometimes referred to as SideWinder-Adjacent, is an active threat actor targeting multiple countries between 2025 and 2026. Their activities are characterized by a campaign centered around a “Tax Audit” theme. This suggests potential targeting of individuals or organizations involved in financial activities or government entities responsible for tax administration. While specific technical details are limited in this brief, the multi-country scope and the social engineering aspect of the “Tax Audit” theme indicate a sophisticated and potentially widespread operation. Defenders should be aware of potential phishing attempts or malicious documents leveraging this theme.

Attack Chain

Due to limited information, a detailed attack chain cannot be fully constructed. However, assuming a typical phishing-based delivery mechanism, a possible attack chain might look like this:

  1. Initial Access: The attacker sends a spearphishing email to a target, posing as a tax authority.
  2. Delivery: The email contains a malicious attachment (e.g., a Microsoft Office document or PDF) or a link to a malicious website.
  3. Exploitation: If the attachment is opened, it exploits a vulnerability (e.g., a macro or a CVE in the document reader) to execute arbitrary code.
  4. Installation: The attacker installs a backdoor or malware on the victim’s machine.
  5. Command and Control: The malware establishes a connection with a command-and-control (C2) server to receive instructions.
  6. Lateral Movement: The attacker uses the compromised machine to move laterally within the network, accessing other systems and resources.
  7. Data Exfiltration: The attacker identifies and exfiltrates sensitive data, such as financial records or personal information.
  8. Final Objective: The ultimate goal could be data theft, financial gain, or espionage.

Impact

Successful RagaSerpent attacks leveraging a tax audit theme could lead to significant data breaches, financial losses, and reputational damage for targeted organizations. Individuals could experience identity theft and financial fraud. The multi-country scope suggests potentially widespread impact, affecting government agencies, financial institutions, and individuals across different regions. The specific damage will depend on the nature of the compromised data and the attacker’s objectives.

Recommendation

  • Implement and tune the provided Sigma rule to detect suspicious process executions potentially related to malicious document exploits (rules[0]).
  • Enable and review process creation logs (Sysmon or equivalent) for better visibility into potential exploit attempts as outlined in the rule’s logsource (rules[0].logsource).
  • Deploy the generic network connection Sigma rule to identify potentially malicious outbound communication from unusual processes (rules[1]).

Detection coverage 2

Detect Suspicious Process Execution from Office Applications

high

Detects suspicious process executions originating from Microsoft Office applications, which may indicate exploitation attempts via malicious documents.

sigma tactics: execution, initial_access techniques: T1204.002, T1566.001 sources: process_creation, windows

Detect Suspicious Outbound Connection by Uncommon Process

medium

Detects suspicious network connections initiated by processes that are not commonly associated with network activity. This can indicate compromised systems communicating with C2 servers.

sigma tactics: command_and_control techniques: T1071.001 sources: network_connection, windows

Detection queries are kept inside the platform. Get full rules →