Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。好的,我先看看这篇文章讲的是什么。 文章主要讲的是一个名为Dust Specter的威胁组织,他们被怀疑与伊朗有关联。他们通过冒充伊拉克外交部来攻击政府官员,使用了新的恶意软件。Zscaler ThreatLabz在2026年1月发现了这个活动,追踪名称是Dust Specter。 攻击分为两个感染链,最终部署了四种恶意软件:SPLITDROP、TWINTASK、TWINTALK和GHOSTFORM。这些恶意软件通过不同的方式执行命令,比如使用PowerShell脚本和内存执行。此外,他们还利用了地理围栏技术和用户代理验证来隐藏自己。 文章还提到,这些攻击者利用了伊拉克政府的基础设施来分发恶意负载,并且使用了一些规避技术来延迟执行和隐藏活动。此外,他们的C2服务器使用随机生成的URI路径和校验和值来确保请求来自感染系统。 还有一个值得注意的地方是,在GHOSTFORM中嵌入了一个Google Forms URL,伪装成伊拉克外交部的调查表单。这可能用于进一步的社会工程学攻击。 Zscaler分析了恶意软件的源代码,发现了一些占位符、表情符号和Unicode文本,推测可能使用了生成式AI工具来辅助开发。此外,C2域名曾在2025年7月被用于类似的网络钓鱼活动。 总的来说,Dust Specter通过复杂的社交工程手段和先进的恶意软件技术对伊拉克政府官员进行了针对性攻击,并且可能与伊朗有关联。 </think> 文章描述了一个名为Dust Specter的伊朗关联威胁组织通过冒充伊拉克外交部对政府官员发起网络攻击的活动。该组织利用新型恶意软件如SPLITDROP、TWINTASK、TWINTALK和GHOSTFORM进行入侵,并通过复杂的C2通信机制和规避技术隐藏行踪。攻击还涉及利用伊拉克政府基础设施分发恶意负载以及生成式AI工具辅助开发恶意软件。 2026-3-5 12:1:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Malware / Threat Intelligence

A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's Ministry of Foreign Affairs to deliver a set of never-before-seen malware.

Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form of two different infection chains, culminate in the deployment of malware dubbed SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM.

"Dust Specter used randomly generated URI paths for command-and-control (C2) communication with checksum values appended to the URI paths to ensure that these requests originated from an actual infected system," security researcher Sudeep Singh said. "The C2 server also utilized geofencing techniques and User-Agent verification."

A notable aspect of the campaign is the compromise of the Iraqi government-related infrastructure to stage malicious payloads, not to mention the use of evasion techniques to delay execution and fly under the radar.

The first attack sequence begins with a password-protected RAR archive, within which there exists a .NET dropper named SPLITDROP, which acts as a conduit for TWINTASK, a worker module, and TWINTALK, a C2 orchestrator.

TWINTASK, for its part, is a malicious DLL ("libvlc.dll") that's sideloaded by the legitimate "vlc.exe" binary to periodically poll a file ("C:\ProgramData\PolGuid\in.txt") every 15 seconds for new commands and run them using PowerShell. This also includes commands to establish persistence on the host via Windows Registry changes. The script output and errors are captured in a separate text file ("C:\ProgramData\PolGuid\out.txt").

TWINTASK, upon first launch, is designed to execute another legitimate binary present in the extracted archive ("WingetUI.exe"), causing it to sideload the TWINTALK DLL ("hostfxr.dll"). Its primary goal is to reach out to the C2 server for new commands, coordinate tasks with TWINTASK, and exfiltrate the results back to the server. It supports the ability to write the command body from the C2 response to "in.txt," as well as download and upload files.

"The C2 orchestrator works in parallel with the previously described worker module to implement a file-based polling mechanism used for code execution," Singh said. "Upon execution, TWINTALK enters a beaconing loop and delays execution by a random interval before polling the C2 server for new commands."

The second attack chain represents an evolution of the first, consolidating all the functionality of TWINTASK and TWINTALK into a single binary dubbed GHOSTFORM. It makes use of in-memory PowerShell script execution to run commands retrieved from the C2 server, thereby eliminating the need for writing artifacts to disk.

That's not the only differentiating factor between the two attack chains. Some GHOSTFORM binaries have been found to embed a hard-coded Google Forms URL that's automatically launched on the system's default web browser once the malware begins execution. The form features content written in Arabic and masquerades as an official survey from Iraq's Ministry of Foreign Affairs.

Zscaler's analysis of the TWINTALK and GHOSTFORM source code has also uncovered the presence of placeholder values, emojis, and Unicode text, suggesting that generative artificial intelligence (AI) tools may have been used to assist with the malware's development.

What's more, the C2 domain associated with TWINTALK, "meetingapp[.]site," is said to have been used by the Dust Specter actors in a July 2025 campaign to host a fake Cisco Webex meeting invitation page that instructs users to copy, paste, and run a PowerShell script to join the meeting. The instructions mirror a tactic widely seen in ClickFix-style social engineering attacks.

The PowerShell script, for its part, creates a directory on the host, and attempts to fetch an unspecified payload from the same domain and save it as an executable within the newly created directory. It also creates a scheduled task to run the malicious binary every two hours.

Dust Specter's connections to Iran are based on the fact that Iranian hacking groups have a history of developing custom lightweight .NET backdoors to achieve their goals. The use of compromised Iraqi government infrastructure has been observed in past campaigns linked to threat actors like OilRig (aka APT34).

"This campaign, attributed with medium-to-high confidence to Dust Specter, likely targeted government officials using convincing social engineering lures impersonating Iraq's Ministry of Foreign Affairs," Zscaler said. "The activity also reflects broader trends, including ClickFix-style techniques and the growing use of generative AI for malware development."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/dust-specter-targets-iraqi-officials.html
如有侵权请联系:admin#unsafe.sh