Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iraqi Officials Targeted by New Malware Campaign

Iraqi Officials Targeted by New Malware Campaign

Posted on March 5, 2026 By CWS

A cyber threat group, suspected to be linked to Iran, is currently targeting Iraqi government officials through a sophisticated malware campaign. This operation, identified by Zscaler ThreatLabz in January 2026, employs deceptive tactics by impersonating Iraq’s Ministry of Foreign Affairs to distribute previously unknown malware variants.

Named Dust Specter, the campaign uses two distinct infection chains, culminating in the deployment of malware such as SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. These sophisticated attacks exploit specialized techniques to ensure communication with the command-and-control (C2) servers, including the use of randomly generated URI paths and geofencing methods to evade detection.

Advanced Malware Techniques Uncovered

The first infection chain involves a password-protected RAR archive containing a .NET-based dropper known as SPLITDROP. This dropper facilitates the execution of TWINTASK, a malicious DLL sideloaded by a legitimate VLC executable, which periodically checks for and executes new commands via PowerShell. This sequence establishes persistence by modifying Windows Registry entries, with all command results logged in separate files.

TWINTASK also triggers the execution of TWINTALK by sideloading its DLL. Acting as a C2 orchestrator, TWINTALK coordinates with TWINTASK to execute commands and uploads results to the C2 server. Its operations include reading command bodies from C2 responses and managing file transfers.

The Evolution of Threat Tactics

The second attack sequence merges the functionalities of TWINTASK and TWINTALK into a single entity, GHOSTFORM, which executes commands in memory without leaving traces on disk. Notably, GHOSTFORM sometimes embeds a Google Forms URL, masquerading as an official survey, to further deceive victims.

Zscaler’s research reveals the potential use of generative AI tools in the malware’s development, indicated by placeholder values and Unicode text within the source code. These findings suggest a growing trend in the use of AI to aid in crafting sophisticated malware.

Historic Connections and Implications

This campaign, believed to be linked to Iranian hacking groups known for creating lightweight .NET backdoors, also draws on compromised Iraqi infrastructure. Similar tactics have been observed in past operations by groups like OilRig (APT34), which have targeted Iraq using various social engineering techniques.

The Dust Specter campaign reflects a pattern of exploiting compromised infrastructure and social engineering methods to infiltrate systems. As cyber threats evolve, understanding these methods is crucial for strengthening defenses and mitigating risks.

Security experts emphasize the importance of remaining vigilant against such sophisticated cyber threats, as the use of generative AI and social engineering continues to rise in the realm of cyber warfare.

The Hacker News Tags:C2 Server, cyber attack, Cybersecurity, Dust Specter, GHOSTFORM, Government, Iran, Iraq, Malware, PowerShell, social engineering, SPLITDROP, threat intelligence, Zscaler

Post navigation

Previous Post: Critical Cisco Firewall Flaw Allows Remote Code Execution
Next Post: Russian Hacker Pleads Guilty Over Phobos Ransomware

Related Posts

APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains The Hacker News
Why Organizations Are Turning to RPAM Why Organizations Are Turning to RPAM The Hacker News
The State of AI in the SOC 2025 The State of AI in the SOC 2025 The Hacker News
SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances The Hacker News
Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps The Hacker News
Overcoming Risks from Chinese GenAI Tool Usage Overcoming Risks from Chinese GenAI Tool Usage The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyber Threats: Key Updates on Malware, Privacy, and Security
  • Drone Strikes Disrupt AWS Services in UAE Region
  • Cisco Alerts on Exploitation of SD-WAN Vulnerabilities
  • Enhancing Windows Security: Tackling MFA and Credential Risks
  • Cyber Attacks on IP Cameras Surge Amid Middle East Tensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyber Threats: Key Updates on Malware, Privacy, and Security
  • Drone Strikes Disrupt AWS Services in UAE Region
  • Cisco Alerts on Exploitation of SD-WAN Vulnerabilities
  • Enhancing Windows Security: Tackling MFA and Credential Risks
  • Cyber Attacks on IP Cameras Surge Amid Middle East Tensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News