Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

AB will be released at Binance -Tech Startups

After data is wiped out, Kiranapro co-founders cannot rule out external hacks

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Iran-linked blade ferine hits Iraqi and Kurdish targets with whispers and spear malware
Identity

Iran-linked blade ferine hits Iraqi and Kurdish targets with whispers and spear malware

userBy userJune 5, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Whisper and Spear Malware

The hacking groups lined up in Iran are attributed to a new set of cyberattacks targeting Kurdish and Iraqi government officials in early 2024.

This activity is linked as the threat group ESET track. This is rated with moderate confidence as a subcluster within Oilrig, a known nation-state cyber actor in Iran. It is said to have been active since September 2017, when it targeted officials related to the Kurdistan Regional Government (KRG).

“The group is developing malware to maintain and expand access within Iraq and KRG organizations,” Slovak Cybersecurity Company said in a technical report shared with Hacker News.

“Bladeferin has consistently worked to maintain illegal access to Kurdish diplomats, while simultaneously using local telecommunications providers in Uzbekistan to develop and maintain access to Iraqi government officials.”

BladedFeline was first documented by ESET as part of its APT activity report in May 2024, detailing enemy attacks on government organisations from the Kurdistan region of Iraq and targeting Uzbekistan mail order companies that they compromised in May 2022.

Cybersecurity

The group was discovered in 2023 following an attack targeting Kurdish diplomats using Shahmaran, a simple backdoor that checks in on a remote server, runs commands provided by the operator of an infected host to upload or download files, request specific file attributes, and provides file and directory manipulation APIs.

Then last November, the cybersecurity company said it had observed attacks on Iranian neighbours, particularly hacking crews against Iraq’s regions and government agencies, as well as diplomatic missions from Iraq to various countries.

“Bladedfeline invests heavily in the collection of diplomatic and financial information from Iraqi organisations, indicating that Iraq plays a major role in the Iranian government’s strategic goals,” ESET said in November 2024.

The exact initial access vector used to enter the victims of KRG is unknown, but it is suspected that threat actors will likely leverage vulnerabilities in their internet-oriented applications to infiltrate Iraqi government networks and deploy a frog webshell to maintain permanent remote access.

How the Whisperback Door works

The wide range of backdoors highlight Bladeferrin’s commitment to refine the malware Arsenal. Whisper logs in to a compromised webmail account on Microsoft Exchange Server and communicates with the attacker via email attachments, C#/. It’s a net back door. Spearal is a .NET backdoor that uses DNS tunnels for command and control communications.

Some attacks observed in December 2023 also include the deployment of a Python implant called a slippery snikelet with limited functionality to execute commands via “cmd.exe”.

Despite the backdoor, BladedFeline is noteworthy for using various tunneling tools Laret and Pinar to maintain access to the target network. We also use a malicious IIS module called Primecache. ESET said there is similarity to the RDAT backdoor used by OilRig Apt.

A passive backdoor, Primecache works by focusing on contained HTTP requests that match predefined cookie header structures to process commands issued by attackers and issued by files.

Cybersecurity

This aspect, coupled with the fact that OilRig’s two tools (RDAT and Reverse Shell CodeNayed VideoSRV) were discovered in the KRG systems that we compromised in September 2017 and September 2018, respectively, suggests that BladedFeLine may be a subgroup within Oilrig, but it differs from the range of subusters in Lyceum-subruster.

Additionally, oil rig connections have been strengthened with reports from the September 2024 checkpoint. This led to infiltrating a network of Iraqi government networks and pointing fingers at Iranian hacking groups to infect whispers and spears using the possibilities of social engineering.

ESET said it had identified a malicious artifact named Hawking Listener that was uploaded to the Baltotal platform by the same party that uploaded the Frog in March 2024. The Hawking Listener runs the command via “cmd.exe” with an early stage implant that listens to the specified port.

“Bladedfeline targets KRG and GOI for cyberspy purposes and is looking to maintain strategic access to senior officials from both government agencies,” the company concluded.

“KRG’s diplomatic ties with Western countries, coupled with oil reserves in the Kurdistan region, have become an attractive target for Iranian-aligned threat actors to spy on and potentially manipulate.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDOJ seizes 145 domains tied to the BidencashCarding Marketplace of Global Takedown
Next Article Birmingham will become World Craft City at WCC International
user
  • Website

Related Posts

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025

Empower users and protect against Genai data loss

June 6, 2025

Microsoft will help CBI to dismantle the Indian call centre behind Japan’s technical assistance scam

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AB will be released at Binance -Tech Startups

After data is wiped out, Kiranapro co-founders cannot rule out external hacks

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Why investing in a growing AI startup is risky and more complicated

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Omada Health is now available: Virtual Care Startup joins IPO Wave, paying $150 million, $1.1 billion valuation of NASDAQ debut

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.