Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

Posted on May 13, 2025May 13, 2025 By CWS

Could 13, 2025Ravie LakshmananZero-Day / Vulnerability
A Türkiye-affiliated menace actor exploited a zero-day safety flaw in an Indian enterprise communication platform known as Output Messenger as a part of a cyber espionage assault marketing campaign since April 2024.
“These exploits have resulted in a set of associated consumer information from targets in Iraq,” the Microsoft Risk Intelligence workforce mentioned. “The targets of the assault are related to the Kurdish navy working in Iraq, in step with beforehand noticed Marbled Mud focusing on priorities.”
The exercise has been attributed to a menace group it tracks as Marbled Mud (previously Silicon), which is also called Cosmic Wolf, Sea Turtle, Teal Kurma, and UNC1326. The hacking crew is believed to have been energetic since at the least 2017, though it wasn’t till two years later that Cisco Talos documented assaults focusing on private and non-private entities within the Center East and North Africa.
Early final yr, it was additionally recognized as focusing on telecommunication, media, web service suppliers (ISPs), data expertise (IT)-service suppliers, and Kurdish web sites within the Netherlands.

Microsoft has assessed with reasonable confidence that the menace actor has performed some kind of reconnaissance beforehand to find out if its targets are Output Messenger customers after which leverage the zero-day to distribute malicious payloads and exfiltrate information from targets.
The vulnerability in query is CVE-2025-27920, a listing traversal vulnerability affecting model 2.0.62 that permits distant attackers to entry or execute arbitrary recordsdata. The problem has been addressed by its developer Srimax as of late December 2024 with model 2.0.63. The corporate, nevertheless, makes no point out of the flaw being exploited within the wild in its advisory.
The assault chain begins with the menace actor getting access to the Output Messenger Server Supervisor utility as an authenticated consumer. It is believed that Marbled Mud makes use of strategies like DNS hijacking or typosquatted domains to intercept the credentials required for authentication.
The entry is then abused to gather the consumer’s Output Messenger credentials and exploit CVE-2025-27920 to drop payloads like “OM.vbs” and “OMServerService.vbs” to the server startup folder and “OMServerService.exe” to the server’s “Customers/public/movies” listing.
Within the subsequent part, the menace actor makes use of “OMServerService.vbs” to invoke “OM.vbs” and “OMServerService.exe,” the latter of which is a Golang backdoor that contacts a hard-coded area (“api.wordinfos[.]com”) for information exfiltration.
“On the shopper aspect, the installer extracts and executes each the reputable file OutputMessenger.exe and OMClientService.exe, one other Golang backdoor that connects to a Marbled Mud command-and-control (C2) area,” Microsoft famous.
“This backdoor first performs a connectivity test by way of a GET request to the C2 area api.wordinfos[.]com. If profitable, a second GET request is shipped to the identical C2 containing hostname data to uniquely establish the sufferer. The response from the C2 is then instantly executed utilizing the command ‘cmd /c’ which instructs the Home windows command immediate to run a particular command after which terminate.”

At one case concerned a sufferer system with Output Messenger shopper software program put in connecting to an IP tackle beforehand recognized as utilized by Marbled Mud for seemingly information exfiltration.
The tech large additionally famous that it found a second flaw, mirrored cross-site scripting (XSS) vulnerability in the identical model (CVE-2025-27921), though it mentioned it discovered no proof of it being weaponized in real-world assaults.
“This new assault indicators a notable shift in Marbled Mud’s functionality whereas sustaining consistency of their total method,” Microsoft mentioned. “The profitable use of a zero-day exploit suggests a rise in technical sophistication and will additionally counsel that Marbled Mud’s focusing on priorities have escalated or that their operational objectives have turn out to be extra pressing.”

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Backdoors, Drop, Exploited, Golang, Hackers, Kurdish, Messenger, Output, Servers, Türkiye, ZeroDay

Post navigation

Previous Post: How to Enable App Permissions Wisely
Next Post: Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

Related Posts

New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks The Hacker News
North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages The Hacker News
AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe The Hacker News
Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries The Hacker News
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers The Hacker News
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks
  • Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
  • OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks
  • Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
  • OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News