Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

Posted on May 13, 2025May 13, 2025 By CWS

Could 13, 2025Ravie LakshmananZero-Day / Vulnerability
A Türkiye-affiliated menace actor exploited a zero-day safety flaw in an Indian enterprise communication platform known as Output Messenger as a part of a cyber espionage assault marketing campaign since April 2024.
“These exploits have resulted in a set of associated consumer information from targets in Iraq,” the Microsoft Risk Intelligence workforce mentioned. “The targets of the assault are related to the Kurdish navy working in Iraq, in step with beforehand noticed Marbled Mud focusing on priorities.”
The exercise has been attributed to a menace group it tracks as Marbled Mud (previously Silicon), which is also called Cosmic Wolf, Sea Turtle, Teal Kurma, and UNC1326. The hacking crew is believed to have been energetic since at the least 2017, though it wasn’t till two years later that Cisco Talos documented assaults focusing on private and non-private entities within the Center East and North Africa.
Early final yr, it was additionally recognized as focusing on telecommunication, media, web service suppliers (ISPs), data expertise (IT)-service suppliers, and Kurdish web sites within the Netherlands.

Microsoft has assessed with reasonable confidence that the menace actor has performed some kind of reconnaissance beforehand to find out if its targets are Output Messenger customers after which leverage the zero-day to distribute malicious payloads and exfiltrate information from targets.
The vulnerability in query is CVE-2025-27920, a listing traversal vulnerability affecting model 2.0.62 that permits distant attackers to entry or execute arbitrary recordsdata. The problem has been addressed by its developer Srimax as of late December 2024 with model 2.0.63. The corporate, nevertheless, makes no point out of the flaw being exploited within the wild in its advisory.
The assault chain begins with the menace actor getting access to the Output Messenger Server Supervisor utility as an authenticated consumer. It is believed that Marbled Mud makes use of strategies like DNS hijacking or typosquatted domains to intercept the credentials required for authentication.
The entry is then abused to gather the consumer’s Output Messenger credentials and exploit CVE-2025-27920 to drop payloads like “OM.vbs” and “OMServerService.vbs” to the server startup folder and “OMServerService.exe” to the server’s “Customers/public/movies” listing.
Within the subsequent part, the menace actor makes use of “OMServerService.vbs” to invoke “OM.vbs” and “OMServerService.exe,” the latter of which is a Golang backdoor that contacts a hard-coded area (“api.wordinfos[.]com”) for information exfiltration.
“On the shopper aspect, the installer extracts and executes each the reputable file OutputMessenger.exe and OMClientService.exe, one other Golang backdoor that connects to a Marbled Mud command-and-control (C2) area,” Microsoft famous.
“This backdoor first performs a connectivity test by way of a GET request to the C2 area api.wordinfos[.]com. If profitable, a second GET request is shipped to the identical C2 containing hostname data to uniquely establish the sufferer. The response from the C2 is then instantly executed utilizing the command ‘cmd /c’ which instructs the Home windows command immediate to run a particular command after which terminate.”

At one case concerned a sufferer system with Output Messenger shopper software program put in connecting to an IP tackle beforehand recognized as utilized by Marbled Mud for seemingly information exfiltration.
The tech large additionally famous that it found a second flaw, mirrored cross-site scripting (XSS) vulnerability in the identical model (CVE-2025-27921), though it mentioned it discovered no proof of it being weaponized in real-world assaults.
“This new assault indicators a notable shift in Marbled Mud’s functionality whereas sustaining consistency of their total method,” Microsoft mentioned. “The profitable use of a zero-day exploit suggests a rise in technical sophistication and will additionally counsel that Marbled Mud’s focusing on priorities have escalated or that their operational objectives have turn out to be extra pressing.”

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Backdoors, Drop, Exploited, Golang, Hackers, Kurdish, Messenger, Output, Servers, Türkiye, ZeroDay

Post navigation

Previous Post: How to Enable App Permissions Wisely
Next Post: Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

Related Posts

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack The Hacker News
Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped The Hacker News
Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft The Hacker News
A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do The Hacker News
Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks The Hacker News
ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark