Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks

Posted on November 18, 2025November 18, 2025 By CWS

Nov 18, 2025Ravie LakshmananCyber Espionage / Malware
Suspected espionage-driven risk actors from Iran have been noticed deploying backdoors like TWOSTROKE and DEEPROOT as a part of continued assaults geared toward aerospace, aviation, and protection industries within the Center East.
The exercise has been attributed by Google-owned Mandiant to a risk cluster tracked as UNC1549 (aka Nimbus Manticore or Delicate Snail), which was first documented by the risk intelligence agency early final yr.
“Working in late 2023 via 2025, UNC1549 employed subtle preliminary entry vectors, together with abuse of third-party relationships to achieve entry (pivoting from service suppliers to their clients), VDI breakouts from third-parties, and extremely focused, role-relevant phishing,” researchers Mohamed El-Banna, Daniel Lee, Mike Stokkel, and Josh Goddard mentioned.
The disclosure comes about two months after Swiss cybersecurity firm PRODAFT tied the hacking group to a marketing campaign focusing on European telecommunications corporations, efficiently breaching 11 organizations within the course of as a part of a recruitment-themed social engineering assault through LinkedIn.

The an infection chains, per Google, contain a mix of phishing campaigns designed to steal credentials or distribute malware and leveraging trusted relationships with third-party suppliers and companions. The second strategy indicators a very intelligent technique when hanging protection contractors.
Whereas these organizations are likely to have sturdy defenses, that is probably not the case with third-party companions – a weak hyperlink within the provide chain that UNC1549 weaponizes to its benefit by first getting access to a linked entity with a purpose to infiltrate its fundamental targets.
Typically, this entails abusing credentials related to providers like Citrix, VMWare, and Azure Digital Desktop and Software (VDA) harvested from these exterior entities to ascertain an preliminary foothold and subsequently escape of the confines of the virtualized periods to achieve entry to the underlying host system and provoke lateral motion actions throughout the goal community.

One other preliminary entry pathway considerations the usage of spear-phishing emails claiming to be associated to job alternatives to lure recipients into clicking on bogus hyperlinks and downloading malware to their machines. UNC1549 has additionally been noticed focusing on IT employees and directors in these assaults to acquire credentials with elevated privileges that may grant them deeper entry to the community.
As soon as the attackers have discovered a approach inside, the post-exploitation exercise spans reconnaissance, credential harvesting, lateral motion, protection evasion, and data theft, systematically gathering community/IT documentation, mental property, and emails.
A number of the customized instruments put to make use of by the risk actor as a part of this effort are listed beneath –

MINIBIKE (aka SlugResin), a identified C++ backdoor that gathers system info and fetches further payloads to conduct reconnaissance, log keystrokes and clipboard content material, steal Microsoft Outlook credentials, accumulate internet browser information from Google Chrome, Courageous, and Microsoft Edge, and take screenshots
TWOSTROKE, a C++ backdoor that permits for system info assortment, DLL loading, file manipulation, and persistence
DEEPROOT, a Golang-based Linux backdoor that helps shell command execution, system info enumeration, and file operations
LIGHTRAIL, a customized tunneler that is probably based mostly on Lastenzug, an open-source Socks4a proxy that communicates utilizing Azure cloud infrastructure
GHOSTLINE, a Golang-based Home windows tunneler that makes use of a hard-coded area for its communication
POLLBLEND, a C++ Home windows tunneler that makes use of hard-coded command-and-control (C2) servers to register itself and obtain tunneler configuration
DCSYNCER.SLICK, a Home windows utility based mostly on DCSyncer to conduct DCSync assaults for privilege escalation
CRASHPAD, a C++ Home windows utility to extract credentials saved inside internet browsers
SIGHTGRAB, a C Home windows utility, selectively deployed to seize screenshots at common intervals and save them to disk
TRUSTTRAP, a malware that serves a Home windows immediate to trick the person into coming into their Microsoft account credentials

Additionally utilized by the adversary are publicly out there applications like AD Explorer to question Lively Listing; Atelier Net Distant Commander (AWRC) to ascertain distant connections, carry out reconnaissance, credential theft, and malware deployment; and SCCMVNC for distant management. Moreover, the risk actor is alleged to have taken steps to stymie investigation by deleting RDP connection historical past registry keys.
“UNC1549’s marketing campaign is distinguished by its give attention to anticipating investigators and guaranteeing long-term persistence after detection,” Mandiant mentioned. “They plant backdoors that beacon silently for months, solely activating them to regain entry after the sufferer has tried eradication.”
“They keep stealth and command-and-control (C2) utilizing intensive reverse SSH shells (which restrict forensic proof) and domains strategically mimicking the sufferer’s trade.”

The Hacker News Tags:Aerospace, Attacks, DEEPROOT, Defense, Hackers, Iranian, Malware, TWOSTROKE

Post navigation

Previous Post: WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data
Next Post: Princeton University Data Breach Impacts Alumni, Students, Employees

Related Posts

Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation The Hacker News
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks The Hacker News
Pen Testing for Compliance Only? It’s Time to Change Your Approach The Hacker News
Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data The Hacker News
Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist The Hacker News
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks
  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks
  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News