Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Confusion sees India as a shortcut in competition with OpenAs

Humanity will strengthen limits on the use of Claude Code without telling it to users

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Iran-linked blade ferine hits Iraqi and Kurdish targets with whispers and spear malware
Identity

Iran-linked blade ferine hits Iraqi and Kurdish targets with whispers and spear malware

userBy userJune 5, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Whisper and Spear Malware

The hacking groups lined up in Iran are attributed to a new set of cyberattacks targeting Kurdish and Iraqi government officials in early 2024.

This activity is linked as the threat group ESET track. This is rated with moderate confidence as a subcluster within Oilrig, a known nation-state cyber actor in Iran. It is said to have been active since September 2017, when it targeted officials related to the Kurdistan Regional Government (KRG).

“The group is developing malware to maintain and expand access within Iraq and KRG organizations,” Slovak Cybersecurity Company said in a technical report shared with Hacker News.

“Bladeferin has consistently worked to maintain illegal access to Kurdish diplomats, while simultaneously using local telecommunications providers in Uzbekistan to develop and maintain access to Iraqi government officials.”

BladedFeline was first documented by ESET as part of its APT activity report in May 2024, detailing enemy attacks on government organisations from the Kurdistan region of Iraq and targeting Uzbekistan mail order companies that they compromised in May 2022.

Cybersecurity

The group was discovered in 2023 following an attack targeting Kurdish diplomats using Shahmaran, a simple backdoor that checks in on a remote server, runs commands provided by the operator of an infected host to upload or download files, request specific file attributes, and provides file and directory manipulation APIs.

Then last November, the cybersecurity company said it had observed attacks on Iranian neighbours, particularly hacking crews against Iraq’s regions and government agencies, as well as diplomatic missions from Iraq to various countries.

“Bladedfeline invests heavily in the collection of diplomatic and financial information from Iraqi organisations, indicating that Iraq plays a major role in the Iranian government’s strategic goals,” ESET said in November 2024.

The exact initial access vector used to enter the victims of KRG is unknown, but it is suspected that threat actors will likely leverage vulnerabilities in their internet-oriented applications to infiltrate Iraqi government networks and deploy a frog webshell to maintain permanent remote access.

How the Whisperback Door works

The wide range of backdoors highlight Bladeferrin’s commitment to refine the malware Arsenal. Whisper logs in to a compromised webmail account on Microsoft Exchange Server and communicates with the attacker via email attachments, C#/. It’s a net back door. Spearal is a .NET backdoor that uses DNS tunnels for command and control communications.

Some attacks observed in December 2023 also include the deployment of a Python implant called a slippery snikelet with limited functionality to execute commands via “cmd.exe”.

Despite the backdoor, BladedFeline is noteworthy for using various tunneling tools Laret and Pinar to maintain access to the target network. We also use a malicious IIS module called Primecache. ESET said there is similarity to the RDAT backdoor used by OilRig Apt.

A passive backdoor, Primecache works by focusing on contained HTTP requests that match predefined cookie header structures to process commands issued by attackers and issued by files.

Cybersecurity

This aspect, coupled with the fact that OilRig’s two tools (RDAT and Reverse Shell CodeNayed VideoSRV) were discovered in the KRG systems that we compromised in September 2017 and September 2018, respectively, suggests that BladedFeLine may be a subgroup within Oilrig, but it differs from the range of subusters in Lyceum-subruster.

Additionally, oil rig connections have been strengthened with reports from the September 2024 checkpoint. This led to infiltrating a network of Iraqi government networks and pointing fingers at Iranian hacking groups to infect whispers and spears using the possibilities of social engineering.

ESET said it had identified a malicious artifact named Hawking Listener that was uploaded to the Baltotal platform by the same party that uploaded the Frog in March 2024. The Hawking Listener runs the command via “cmd.exe” with an early stage implant that listens to the specified port.

“Bladedfeline targets KRG and GOI for cyberspy purposes and is looking to maintain strategic access to senior officials from both government agencies,” the company concluded.

“KRG’s diplomatic ties with Western countries, coupled with oil reserves in the Kurdistan region, have become an attractive target for Iranian-aligned threat actors to spy on and potentially manipulate.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDOJ seizes 145 domains tied to the BidencashCarding Marketplace of Global Takedown
Next Article Birmingham will become World Craft City at WCC International
user
  • Website

Related Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

July 17, 2025

Hackers exploit flaws in apache http server to deploy linuxsys cryptocurrency miner

July 17, 2025

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

July 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Confusion sees India as a shortcut in competition with OpenAs

Humanity will strengthen limits on the use of Claude Code without telling it to users

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Openai launches a general purpose agent with ChatGpt

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.