Iranian Hackers Target Iraqi Officials via Custom Malware

Iran-aligned Dust Specter targets Iraqi officials with novel AI-assisted malware.

  • A suspected Iran-nexus threat actor, tracked as Dust Specter, impersonated Iraq’s Ministry of Foreign Affairs to target government officials with new malware.
  • The campaign deployed four distinct malware families—SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM—using Iraqi government infrastructure to host payloads.
  • Evidence within the malware’s source code suggests generative AI tools may have assisted in its development.
  • The attacks employed advanced evasion, including geofencing, delayed execution, and file-based polling for command retrieval.

A suspected Iran-nexus actor code-named Dust Specter targeted Iraqi government officials in January 2026, deploying never-before-seen malware in a sophisticated impersonation campaign. Zscaler ThreatLabz observed this activity, which used two distinct infection chains to ultimately deliver a suite of malicious tools.

- Advertisement -

The first chain began with a password-protected RAR archive containing the SPLITDROP dropper. Consequently, this module delivered the TWINTASK worker and TWINTALK command orchestrator to compromised systems.

TWINTASK, a malicious DLL, sideloaded via a legitimate binary to poll a local file every 15 seconds for new commands. Security researcher Sudeep Singh said the actors used randomly generated URI paths with checksums to verify infected systems.

Meanwhile, TWINTALK’s role was to communicate with the command-and-control server for new instructions. Its C2 server also utilized geofencing techniques and User-Agent verification to avoid detection.

The second attack chain represented an evolution, consolidating functionality into a single binary called GHOSTFORM. However, this variant uniquely embedded a hard-coded Google Forms URL that launched a fake Arabic-language survey upon execution.

- Advertisement -

Analysis of the malware source code revealed placeholder values, emojis, and Unicode text. This suggests generative artificial intelligence tools may have been used to assist with the malware’s development.

Furthermore, the C2 domain was previously used in a July 2025 campaign hosting a fake Cisco Webex invitation. This earlier attack used a ClickFix-style script to fetch and schedule a malicious payload on the host.

Attribution to an Iran-nexus group is based on their history of developing custom .NET backdoors and using compromised Iraqi infrastructure. Zscaler stated this campaign was attributed with medium-to-high confidence to Dust Specter.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Stolen Crypto Wallet Emptied Twice After Seed Phrase Leak

South Korea's National Tax Service accidentally leaked a seed phrase, leading to the theft...

ADA Payable at 137 Swiss Spar Supermarkets

Spar supermarkets across Switzerland now accept Cardano's ADA token for grocery purchases via an...

BRICS Backs Iran as Tensions Rock Markets, India’s Stance Unclear

Escalating Middle East tensions between Israel, Iran, and the US have triggered a global...

Ethereum ETF Inflows Hit 2-Month High Amid Rally

U.S. spot Ethereum ETFs saw their highest inflows in two months at $169 million,...

Analyst: Bitcoin Over $70K Aims for Another Rally

Analyst Ted Pillows says a sustained price above $70,000 gives Bitcoin a "decent chance"...

Must Read

Top 7 BEST Crypto Trading Bots for Beginners

QUICK NAVIGATIONQuick Look: Top 3 Best Crypto Trading BotsWhat Exactly is a Crypto Trading Bot?How I Chose These Trading BotsTop 7 Crypto Trading Bots...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!