Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iraqi Officials Targeted by New Malware Campaign

Iraqi Officials Targeted by New Malware Campaign

Posted on March 5, 2026 By CWS

A cyber threat group, suspected to be linked to Iran, is currently targeting Iraqi government officials through a sophisticated malware campaign. This operation, identified by Zscaler ThreatLabz in January 2026, employs deceptive tactics by impersonating Iraq’s Ministry of Foreign Affairs to distribute previously unknown malware variants.

Named Dust Specter, the campaign uses two distinct infection chains, culminating in the deployment of malware such as SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. These sophisticated attacks exploit specialized techniques to ensure communication with the command-and-control (C2) servers, including the use of randomly generated URI paths and geofencing methods to evade detection.

Advanced Malware Techniques Uncovered

The first infection chain involves a password-protected RAR archive containing a .NET-based dropper known as SPLITDROP. This dropper facilitates the execution of TWINTASK, a malicious DLL sideloaded by a legitimate VLC executable, which periodically checks for and executes new commands via PowerShell. This sequence establishes persistence by modifying Windows Registry entries, with all command results logged in separate files.

TWINTASK also triggers the execution of TWINTALK by sideloading its DLL. Acting as a C2 orchestrator, TWINTALK coordinates with TWINTASK to execute commands and uploads results to the C2 server. Its operations include reading command bodies from C2 responses and managing file transfers.

The Evolution of Threat Tactics

The second attack sequence merges the functionalities of TWINTASK and TWINTALK into a single entity, GHOSTFORM, which executes commands in memory without leaving traces on disk. Notably, GHOSTFORM sometimes embeds a Google Forms URL, masquerading as an official survey, to further deceive victims.

Zscaler’s research reveals the potential use of generative AI tools in the malware’s development, indicated by placeholder values and Unicode text within the source code. These findings suggest a growing trend in the use of AI to aid in crafting sophisticated malware.

Historic Connections and Implications

This campaign, believed to be linked to Iranian hacking groups known for creating lightweight .NET backdoors, also draws on compromised Iraqi infrastructure. Similar tactics have been observed in past operations by groups like OilRig (APT34), which have targeted Iraq using various social engineering techniques.

The Dust Specter campaign reflects a pattern of exploiting compromised infrastructure and social engineering methods to infiltrate systems. As cyber threats evolve, understanding these methods is crucial for strengthening defenses and mitigating risks.

Security experts emphasize the importance of remaining vigilant against such sophisticated cyber threats, as the use of generative AI and social engineering continues to rise in the realm of cyber warfare.

The Hacker News Tags:C2 Server, cyber attack, Cybersecurity, Dust Specter, GHOSTFORM, Government, Iran, Iraq, Malware, PowerShell, social engineering, SPLITDROP, threat intelligence, Zscaler

Post navigation

Previous Post: Critical Cisco Firewall Flaw Allows Remote Code Execution
Next Post: Russian Hacker Pleads Guilty Over Phobos Ransomware

Related Posts

Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack The Hacker News
A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces The Hacker News
New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions The Hacker News
GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The Hacker News
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks The Hacker News
Meta Shuts Down 150K Accounts in Global Anti-Scam Effort Meta Shuts Down 150K Accounts in Global Anti-Scam Effort The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark