Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Posted on September 2, 2025September 2, 2025 By CWS

A classy spear-phishing marketing campaign orchestrated by Iranian-aligned operators has been recognized focusing on diplomatic missions worldwide by a compromised Ministry of Overseas Affairs of Oman mailbox.

The assault, found in August 2025, represents a continuation of ways related to the Homeland Justice group linked to Iran’s Ministry of Intelligence and Safety (MOIS).

The marketing campaign leveraged social engineering methods to distribute malicious Microsoft Phrase paperwork masquerading as pressing diplomatic communications.

Attackers despatched emails from a compromised @fm.gov.om tackle, routing site visitors by a NordVPN exit node in Jordan (212.32.83.11) to obscure their true origin.

Recipients throughout 270 e mail addresses spanning embassies, consulates, and worldwide organizations in a number of areas obtained paperwork with topics referencing “The Way forward for the area after the Iran-Israel conflict and the function of Arab international locations within the Center East”.

The Iran-Nexus Spear phishing Marketing campaign assault path (Supply – Dreamgroup)

Dreamgroup analysts recognized that the marketing campaign prolonged far past preliminary assessments, with 104 distinctive compromised addresses utilized to masks the operation’s true scope.

The malware embedded inside connected Phrase paperwork employed refined encoding methods, changing numerical sequences into ASCII characters by VBA macro code execution.

Assault Mechanism

The technical sophistication of the assault turns into obvious when inspecting its execution mechanism.

The malicious paperwork contained VBA macros hidden inside “This Doc” and “UserForm1” modules, implementing a multi-stage payload supply system.

Marketing campaign VBA Macro Execution Chain (Supply – Dreamgroup)

The first decoder perform, designated as “dddd,” systematically processes encoded strings by studying three-digit segments and changing them to ASCII characters utilizing the components Chr (Val (Mid (str, counter, 3))).

A very noteworthy evasion method entails the “laylay” perform, which creates synthetic delays by 4 nested loops executing 105 iterations every.

This anti-analysis routine considerably hampers dynamic evaluation instruments and automatic sandbox detection techniques.

The malware writes its payload to C:UsersPublicDocumentsManagerProc[.]log, disguising the executable as a innocent log file earlier than execution through the Shell command with vbHide parameters.

Upon profitable deployment, the sysProcUpdate executable establishes persistence by copying itself to C:ProgramDatasysProcUpdate[.]exe and modifying Home windows registry DNS parameters.

The malware collects system metadata together with username, pc identify, and administrative privileges, transmitting this data through encrypted HTTPS POST requests to the command-and-control server at screenai.on-line/Dwelling/.

Enhance your SOC and assist your staff defend your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Abuses, Global, Governments, Hackers, IranNexus, Mailbox, Omani, Target

Post navigation

Previous Post: Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers
Next Post: New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains

Related Posts

Hackers Exploit DNS Queries for C2 Operations and Data Exfiltration, Bypassing Traditional Defenses Cyber Security News
Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Cyber Security News
Cybersecurity Newsletter Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More Cyber Security News
HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit Cyber Security News
Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access Cyber Security News
Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
  • New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
  • New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
  • PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
  • Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
  • New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
  • New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
  • PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
  • Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News