Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
Razor Tiger, also known as SideWinder, APT-C-17, and Rattlesnake, is a nation-state-sponsored threat actor active since at least 2012. Believed to operate from India, the group specializes in cyber-espionage targeting military, government, and maritime sectors. Razor Tiger employs spear-phishing, fileless malware, and advanced infrastructure to achieve its objectives.
The group focuses on intelligence gathering, targeting national defense, diplomatic, and critical infrastructure sectors.
Razor Tiger leverages spear-phishing emails, malicious Office documents, and fileless malware to infiltrate targets. Exploited vulnerabilities include CVE-2017-11882 and CVE-2017-0199.
The group uses multi-stage loaders, obfuscated JavaScript, and modular implants like StealerBot and WarHawk. Command-and-control (C2) infrastructure includes over 400 domains and dynamic subdomains.
2013: Phishing attack on the Indian Embassy in Kabul, leading to data exfiltration.
2024: Targeted maritime facilities in the Mediterranean using geofenced payloads.
2025: Breach of Pakistan's Cabinet Division with kernel-level malware.
No arrests or direct law enforcement actions against Razor Tiger have been reported.
Monitor IOCs: Regularly update threat intelligence feeds.
Patch Systems: Address vulnerabilities like CVE-2017-11882.
Use Multi-Factor Authentication to Strengthen Access Controls.