Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Post-Quantum Cryptography Webinar for Security Leaders

Dust Specter targets Iraqi officials with new SPLITDROP and GHOSTFORM malware

Large-scale language model for Estonia’s sovereign AI infrastructure

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Dust Specter targets Iraqi officials with new SPLITDROP and GHOSTFORM malware
Identity

Dust Specter targets Iraqi officials with new SPLITDROP and GHOSTFORM malware

userBy userMarch 5, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 5, 2026Malware/Threat Intelligence

A suspected Iranian-linked actor is believed to have been involved in a campaign targeting Iraqi government officials by impersonating the Iraqi Ministry of Foreign Affairs and delivering a series of never-before-seen malware.

Zscaler ThreatLabz, which observed this activity in January 2026, is tracking this cluster under the name Dust Specter. This attack manifests itself in two distinct infection chains, culminating in the deployment of malware called SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM.

“Dust Specter used randomly generated URI paths for command-and-control (C2) communications, and a checksum value was appended to the URI path to ensure that these requests originated from real, infected systems,” said security researcher Sudeep Singh. “The C2 server also utilized geofencing technology and user agent verification.”

A notable aspect of this campaign is the compromise of Iraqi government-related infrastructure in order to stage malicious payloads, not to mention the use of techniques to delay execution, fly under the radar, and evade.

The first attack sequence begins with a password-protected RAR archive. Inside this archive is a .NET dropper named SPLITDROP that acts as a conduit between the worker module TWINTASK and the C2 orchestrator TWINTALK.

TWINTASK is a malicious DLL (‘libvlc.dll’) that is sideloaded by the legitimate ‘vlc.exe’ binary and periodically polls a file (‘C:\ProgramData\PolGuid\in.txt’) every 15 seconds for new commands and executes them using PowerShell. This also includes commands to establish persistence on the host through Windows registry changes. Script output and errors are captured in a separate text file (‘C:\ProgramData\PolGuid\out.txt’).

Upon first launch, TWINTASK is designed to run another legitimate binary present in the extracted archive (‘WingetUI.exe’) and sideload the TWINTALK DLL (‘hostfxr.dll’). Its main purpose is to access the C2 server to obtain new commands, coordinate tasks with TWINTASK, and extract the results back to the server. Supports the ability to write the command body from the C2 response to “in.txt”, as well as file downloads and uploads.

“The C2 orchestrator runs in parallel with the worker modules mentioned above and implements the file-based polling mechanism used to execute the code,” said Singh. “When executed, TWINTALK enters a beacon loop and delays execution for a random interval before polling the C2 server for new commands.”

The second attack chain represents an evolution of the first attack chain and combines all the functionality of TWINTASK and TWINTALK into a single binary called GHOSTFORM. It leverages in-memory PowerShell script execution to execute commands retrieved from the C2 server, eliminating the need to write artifacts to disk.

This is not the only factor that distinguishes the two attack chains. Some GHOSTFORM binaries have been found to contain a hard-coded Google Forms URL that is automatically launched in the system’s default web browser once the malware starts running. The form features content written in Arabic and purports to be an official investigation from the Iraqi Ministry of Foreign Affairs.

Zscaler’s analysis of the TWINTALK and GHOSTFORM source code also revealed the presence of placeholder values, emojis, and Unicode text, suggesting that generative artificial intelligence (AI) tools may have been used to aid in the development of the malware.

Additionally, the C2 domain “meetingapp” associated with TWINTALK[.]site” was allegedly used by Dust Specter attackers in a July 2025 campaign to host a fake Cisco Webex meeting invite page that instructs users to copy, paste, and run a PowerShell script to join a meeting. This instruction reflects a tactic commonly seen in ClickFix-style social engineering attacks.

The PowerShell script creates a directory on the host and attempts to retrieve an unspecified payload from the same domain and save it as an executable file within the newly created directory. It also creates a scheduled task that runs the malicious binary every two hours.

Dust Specter’s connection to Iran is based on the fact that Iranian hacker groups have been developing custom lightweight .NET backdoors to achieve their goals. The use of compromised Iraqi government infrastructure has been observed in past campaigns associated with threat actors such as OilRig (also known as APT34).

“This campaign is attributed to Dust Specter with medium to high confidence and likely targeted government officials using convincing social engineering lures impersonating the Iraqi Ministry of Foreign Affairs,” Zuscaler said. “This activity also reflects broader trends, such as the increasing use of ClickFix-style techniques and generative AI in malware development.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLarge-scale language model for Estonia’s sovereign AI infrastructure
Next Article Post-Quantum Cryptography Webinar for Security Leaders
user
  • Website

Related Posts

Post-Quantum Cryptography Webinar for Security Leaders

March 5, 2026

Where multi-factor authentication stops and credential abuse begins

March 5, 2026

APT28-related campaign deploys BadPaw Loader and MeowMeow backdoor in Ukraine

March 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Post-Quantum Cryptography Webinar for Security Leaders

Dust Specter targets Iraqi officials with new SPLITDROP and GHOSTFORM malware

Large-scale language model for Estonia’s sovereign AI infrastructure

Where multi-factor authentication stops and credential abuse begins

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.