Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Türkiye Hackers operate the Messenger Zero-Day withdrawal to give up Golang Backdoors on Kurdish servers
Global Security

Türkiye Hackers operate the Messenger Zero-Day withdrawal to give up Golang Backdoors on Kurdish servers

AdminBy AdminMay 13, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 13, 2025Red LakshmananZero day / vulnerability

The Türkiye threat actor exploits the lack of security with zero day on the Indian communication platform called “Messenger withdrawal” as part of a cyber-spanning campaign since April 2024.

“These exploits have led to the collection of relevant users’ data for goals in Iraq,” Microsoft’s intelligence group – Note. “The targets of the attack are related to the Kurdish military personnel operating in Iraq, according to previously observed marble priorities aimed at dust.”

Activities has been associated with a group of threats it monitors as Marble dust (Previously silicon), which is also known as a space wolf, sea turtle, kurk –ko and unc1326. It is believed that the hacking of the crew was active, at least since 2017, although only two years later Cisco Talos recorded attacks aimed at public and private structures in the Middle East and North Africa.

Earlier last year, it was also defined as an orientation to telecommunications, media, Internet service providers (providers), information technology (IT), service providers and Kurdish sites in the Netherlands.

Cybersecurity

Microsoft evaluated with moderate confidence that the actor threatened in advance to determine whether it is the purpose of ejection Messenger users and then use zero day to distribute harmful loads and operating data for purposes.

Vulnerability in question Cve-2025-27920The vulnerability of the catalog that affects the 2.0.62 version, which allows remote attackers to access and execute arbitrary files. The question was address With its developers SRIMAX as of the end of December 2024 with version 2.0.63. The company, however, does not mention the lack that is exploited in the wild in its advisory.

The attack network begins with the fact that the actor threats are accessed by the Servger Server Manager as an authentified user. Marble dust is believed to use methods such as DNS kidnapping or typical domains to intercept the credentials needed to authenticate.

The access is then abused to collect the Messenger conclusion credentials and use the CVE-2025-27920 to give up useful loads such as “om.VBS” and “omserverservice.vbs” to the server launch folder and omserverservice.exe.

In the next phase, the threatening actor uses “omserverservice.vbs” to cause “om.vbs” and “omserverservice.exe”, the latter of which is the back of the Golang, which contacts a solid domain (“Api.wordinfos (.) Com”

“On the client’s side, the installer highlights and performs both legitimate files outPutmessenger.exe, as well as omclientservice.exe, another back of Golang, which connects to the marble domain and control (C2),” Microsoft noted.

“This back first performs the connection check using the request to the C2 API.Wordinfos domain (.) Com. If this successfully, the second request is sent to the same C2 that contains information about the host name to clearly determine the victim.

Cybersecurity

In one case, the victim’s device with the Messenger client, installed by IP -Odars, which had previously been used by marble dust for a likely expressive data, participated.

The technological giant also noted that he discovered in the same version the second drawback, reflected the vulnerability of the scripts (XSS) (XSS) (in the same version (Cve-2025-27921) Although it states that it did not show evidence that he was armed with real attacks.

“This new attack signals a noticeable shift in the possibility of marble, while maintaining the sequence in their overall approach,” said Microsoft. “Successful use of the zero day feat suggests an increase in technical sophistication, and may also suggest that marble dust priorities have grown or that their operative goals have become more relevant.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.