
Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.

The Group-IB Threat Intelligence team’s monitoring of state-sponsored threat actors’ activity revealed some tools belonging to SideWinder that had not been described in the public domain before. In addition to detailing the functionality and techniques employed in SideWinder’s new tools, the report describes the phishing part of the group’s 2021 operations based on backup archives obtained by Group-IB.
The archives contained several phishing projects designed to target government, military, and law agencies in South and East Asia, among which were fake websites imitating the Central Bank of Myanmar and more.
Despite its long history, SideWinder continues to be one of the most active state-sponsored hacker groups that pose a threat to governments in the Asia-Pacific region. The techniques and tools described in this report are currently used by the group and therefore relevant.