Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Posted on September 2, 2025September 2, 2025 By CWS

A classy spear-phishing marketing campaign orchestrated by Iranian-aligned operators has been recognized focusing on diplomatic missions worldwide by a compromised Ministry of Overseas Affairs of Oman mailbox.

The assault, found in August 2025, represents a continuation of ways related to the Homeland Justice group linked to Iran’s Ministry of Intelligence and Safety (MOIS).

The marketing campaign leveraged social engineering methods to distribute malicious Microsoft Phrase paperwork masquerading as pressing diplomatic communications.

Attackers despatched emails from a compromised @fm.gov.om tackle, routing site visitors by a NordVPN exit node in Jordan (212.32.83.11) to obscure their true origin.

Recipients throughout 270 e mail addresses spanning embassies, consulates, and worldwide organizations in a number of areas obtained paperwork with topics referencing “The Way forward for the area after the Iran-Israel conflict and the function of Arab international locations within the Center East”.

The Iran-Nexus Spear phishing Marketing campaign assault path (Supply – Dreamgroup)

Dreamgroup analysts recognized that the marketing campaign prolonged far past preliminary assessments, with 104 distinctive compromised addresses utilized to masks the operation’s true scope.

The malware embedded inside connected Phrase paperwork employed refined encoding methods, changing numerical sequences into ASCII characters by VBA macro code execution.

Assault Mechanism

The technical sophistication of the assault turns into obvious when inspecting its execution mechanism.

The malicious paperwork contained VBA macros hidden inside “This Doc” and “UserForm1” modules, implementing a multi-stage payload supply system.

Marketing campaign VBA Macro Execution Chain (Supply – Dreamgroup)

The first decoder perform, designated as “dddd,” systematically processes encoded strings by studying three-digit segments and changing them to ASCII characters utilizing the components Chr (Val (Mid (str, counter, 3))).

A very noteworthy evasion method entails the “laylay” perform, which creates synthetic delays by 4 nested loops executing 105 iterations every.

This anti-analysis routine considerably hampers dynamic evaluation instruments and automatic sandbox detection techniques.

The malware writes its payload to C:UsersPublicDocumentsManagerProc[.]log, disguising the executable as a innocent log file earlier than execution through the Shell command with vbHide parameters.

Upon profitable deployment, the sysProcUpdate executable establishes persistence by copying itself to C:ProgramDatasysProcUpdate[.]exe and modifying Home windows registry DNS parameters.

The malware collects system metadata together with username, pc identify, and administrative privileges, transmitting this data through encrypted HTTPS POST requests to the command-and-control server at screenai.on-line/Dwelling/.

Enhance your SOC and assist your staff defend your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Abuses, Global, Governments, Hackers, IranNexus, Mailbox, Omani, Target

Post navigation

Previous Post: Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers
Next Post: New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains

Related Posts

APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task Cyber Security News
Adversarial Machine Learning – Securing AI Models Cyber Security News
Authorities Busted Ransomware Gang – Nine Laptops and 15 Mobile Devices Were Seized Cyber Security News
Linux Kernel netfilter Vulnerability Let Attackers Escalate Privileges Cyber Security News
Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access Cyber Security News
Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes
  • CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation
  • Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations
  • Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances
  • How to Use a Secure File Sharing Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes
  • CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation
  • Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations
  • Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances
  • How to Use a Secure File Sharing Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News