Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
Razor Tiger, also known as SideWinder, APT-C-17, and Rattlesnake, is a nation-state-sponsored threat actor active since at least 2012. Believed to operate from India, the group specializes in cyber-espionage targeting military, government, and maritime sectors. Razor Tiger employs spear-phishing, fileless malware, and advanced infrastructure to achieve its objectives.
The group focuses on intelligence gathering, targeting national defense, diplomatic, and critical infrastructure sectors.
Razor Tiger leverages spear-phishing emails, malicious Office documents, and fileless malware to infiltrate targets. Exploited vulnerabilities include CVE-2017-11882 and CVE-2017-0199.
The group uses multi-stage loaders, obfuscated JavaScript, and modular implants like StealerBot and WarHawk. Command-and-control (C2) infrastructure includes over 400 domains and dynamic subdomains.
IPs: 2.58.15[.]61, 89.150.40[.]43
Domains: hyat[.]tech, fia-gov[.]net
Hashes: 9345d52abd5bab4320c1273eb2c90161
Razor Tiger has targeted:
Military and government entities in Pakistan and China
Maritime facilities in Egypt and Sri Lanka
Nuclear and logistics sectors in South Asia
2013: Phishing attack on the Indian Embassy in Kabul, leading to data exfiltration.
2024: Targeted maritime facilities in the Mediterranean using geofenced payloads.
2025: Breach of Pakistan's Cabinet Division with kernel-level malware.
No arrests or direct law enforcement actions against Razor Tiger have been reported.
Monitor IOCs: Regularly update threat intelligence feeds.
Patch Systems: Address vulnerabilities like CVE-2017-11882.
Use Multi-Factor Authentication to Strengthen Access Controls.