Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Threatening actor Mimo deploys crypto miners and proxyware targeting magento and dockers

Trump’s AI strategy will trade guardrails for racial growth with China

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Türkiye hackers misused output messenger zero day to drop a gorun backdoor on Kurdish server
Identity

Türkiye hackers misused output messenger zero day to drop a gorun backdoor on Kurdish server

userBy userMay 13, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 13, 2025Ravi LakshmananZero Day/Vulnerability

The Türkiye-related threat actor exploited the zero-day security flaw on an Indian enterprise communications platform called Output Messenger as part of its cyberspy attack campaign since April 2024.

“These exploits have resulted in a collection of relevant user data from targets in Iraq,” the Microsoft Threat Intelligence team said. “The targets of the attack are associated with Kurdish forces operating in Iraq and are consistent with previously observed marble dust targeting priorities.”

This activity is attributed to a threat group that tracks it as marble dust (formerly silicon), also known as Space Wolf, Horse, Teal Kruma, and UNC1326. The hacking crew is believed to have been active since at least 2017, but two years later, there has been no record of Cisco Talos recording attacks targeting public and private businesses in the Middle East and North Africa.

Earlier last year, it was also identified as targeting Dutch telecommunications, media, internet service providers (ISPs), information technology (IT) service providers, and Kurdish websites.

Cybersecurity

Microsoft has evaluated with moderate confidence that threat actors will do some sort of reconnaissance in advance to determine if the target is an output messenger user, leverage zero-day to distribute malicious payloads and remove data from the target.

The vulnerability in question is CVE-2025-27920. This is a directory traversal vulnerability affecting version 2.0.62 that allows remote attackers to access or execute arbitrary files. This issue was addressed by developer Srimax in late December 2024 with version 2.0.63. However, the company has not mentioned any defects exploited in the wild in its recommendations.

The attack chain begins with the threat actor being able to access the output Messenger Server Manager application as an authenticated user. Marble dust is believed to use techniques such as DNS hijacking and type squat domains to intercept the credentials required for authentication.

The access is then abused, collecting the user’s output messenger credentials and exploiting CVE-2025-27920 to drop payloads such as “OM.VBS” and “OmServerservice.vbs” in the server startup folder and into the “User/Published/Video” directory such as “OmServerservice.exe”.

In the next phase, the threat actor uses “omserverservice.vbs” to invoke “om.vbs” and “omserverservice.exe”.[.]com “) For data removal.

“On the client side, the installer extracts and runs both the legitimate files outputmessenger.exe.exe and omclientservice.exe.exe.

“This backdoor will first perform a connection check via a GET request to C2 domain API.WORDINFOS[.]com. If successful, a second GET request is sent to the same C2 containing the hostname information, uniquely identifying the victim. The response from C2 is then run directly using the command “CMD/C” which tells the Windows command prompt to run a specific command and then exit.

Cybersecurity

In one case, a victim device was included with output messenger client software. This was connected to an IP address previously identified as being used in marble dust for data stripping.

Tech Giant also noted that it discovered a second flaw that reflected the vulnerability of cross-site scripting (XSS) in the same version (CVE-2025-27921), but found no evidence of weaponization in actual attacks.

“This new attack shows a significant change in marble dust capabilities while maintaining consistency in the overall approach,” Microsoft said. “The successful use of zero-day exploits suggests an increase in technical refinement, potentially suggesting that marble dust targeting priorities have escalated or operational targets have become more urgent.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFintech, which has made profits from high interest rates, faces key tests
Next Article Moldova police arrest suspect in a 4.5 million euro ransomware attack on a Dutch research institution
user
  • Website

Related Posts

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

July 23, 2025

Threatening actor Mimo deploys crypto miners and proxyware targeting magento and dockers

July 23, 2025

New Coyote Malware Variants Abuse Windows UI Automation to Steal Bank Credentials

July 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Threatening actor Mimo deploys crypto miners and proxyware targeting magento and dockers

Trump’s AI strategy will trade guardrails for racial growth with China

The UK targets Regulation’s Apple and Google mobile platforms

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.