Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Posted on September 2, 2025September 2, 2025 By CWS

A classy spear-phishing marketing campaign orchestrated by Iranian-aligned operators has been recognized focusing on diplomatic missions worldwide by a compromised Ministry of Overseas Affairs of Oman mailbox.

The assault, found in August 2025, represents a continuation of ways related to the Homeland Justice group linked to Iran’s Ministry of Intelligence and Safety (MOIS).

The marketing campaign leveraged social engineering methods to distribute malicious Microsoft Phrase paperwork masquerading as pressing diplomatic communications.

Attackers despatched emails from a compromised @fm.gov.om tackle, routing site visitors by a NordVPN exit node in Jordan (212.32.83.11) to obscure their true origin.

Recipients throughout 270 e mail addresses spanning embassies, consulates, and worldwide organizations in a number of areas obtained paperwork with topics referencing “The Way forward for the area after the Iran-Israel conflict and the function of Arab international locations within the Center East”.

The Iran-Nexus Spear phishing Marketing campaign assault path (Supply – Dreamgroup)

Dreamgroup analysts recognized that the marketing campaign prolonged far past preliminary assessments, with 104 distinctive compromised addresses utilized to masks the operation’s true scope.

The malware embedded inside connected Phrase paperwork employed refined encoding methods, changing numerical sequences into ASCII characters by VBA macro code execution.

Assault Mechanism

The technical sophistication of the assault turns into obvious when inspecting its execution mechanism.

The malicious paperwork contained VBA macros hidden inside “This Doc” and “UserForm1” modules, implementing a multi-stage payload supply system.

Marketing campaign VBA Macro Execution Chain (Supply – Dreamgroup)

The first decoder perform, designated as “dddd,” systematically processes encoded strings by studying three-digit segments and changing them to ASCII characters utilizing the components Chr (Val (Mid (str, counter, 3))).

A very noteworthy evasion method entails the “laylay” perform, which creates synthetic delays by 4 nested loops executing 105 iterations every.

This anti-analysis routine considerably hampers dynamic evaluation instruments and automatic sandbox detection techniques.

The malware writes its payload to C:UsersPublicDocumentsManagerProc[.]log, disguising the executable as a innocent log file earlier than execution through the Shell command with vbHide parameters.

Upon profitable deployment, the sysProcUpdate executable establishes persistence by copying itself to C:ProgramDatasysProcUpdate[.]exe and modifying Home windows registry DNS parameters.

The malware collects system metadata together with username, pc identify, and administrative privileges, transmitting this data through encrypted HTTPS POST requests to the command-and-control server at screenai.on-line/Dwelling/.

Enhance your SOC and assist your staff defend your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Abuses, Global, Governments, Hackers, IranNexus, Mailbox, Omani, Target

Post navigation

Previous Post: Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers
Next Post: New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains

Related Posts

Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges Cyber Security News
CrowdStrike Falcon Windows Sensor Vulnerability Let Attackers Execute Code and Delete Files on Host CrowdStrike Falcon Windows Sensor Vulnerability Let Attackers Execute Code and Delete Files on Host Cyber Security News
Apache Syncope Groovy RCE Vulnerability Let Attackers Inject Malicious Code Apache Syncope Groovy RCE Vulnerability Let Attackers Inject Malicious Code Cyber Security News
Sophisticated DevilsTongue Windows Spyware Tracking Users Globally Sophisticated DevilsTongue Windows Spyware Tracking Users Globally Cyber Security News
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Cornwell Quality Tools Data Breach Cornwell Quality Tools Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark