Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Harmful Pack of Pypi, which poses as Solana Tool, stole the source code in 761 downloads

May 13, 2025

China associated with China, exploit SAP Cve-2025-31324 to break 581 critical systems worldwide

May 13, 2025

North Korean Horse, which is aimed at Ukraine with malware

May 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Türkiye Hackers operate the Messenger Zero-Day withdrawal to give up Golang Backdoors on Kurdish servers
Global Security

Türkiye Hackers operate the Messenger Zero-Day withdrawal to give up Golang Backdoors on Kurdish servers

AdminBy AdminMay 13, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 13, 2025Red LakshmananZero day / vulnerability

The Türkiye threat actor exploits the lack of security with zero day on the Indian communication platform called “Messenger withdrawal” as part of a cyber-spanning campaign since April 2024.

“These exploits have led to the collection of relevant users’ data for goals in Iraq,” Microsoft’s intelligence group – Note. “The targets of the attack are related to the Kurdish military personnel operating in Iraq, according to previously observed marble priorities aimed at dust.”

Activities has been associated with a group of threats it monitors as Marble dust (Previously silicon), which is also known as a space wolf, sea turtle, kurk –ko and unc1326. It is believed that the hacking of the crew was active, at least since 2017, although only two years later Cisco Talos recorded attacks aimed at public and private structures in the Middle East and North Africa.

Earlier last year, it was also defined as an orientation to telecommunications, media, Internet service providers (providers), information technology (IT), service providers and Kurdish sites in the Netherlands.

Cybersecurity

Microsoft evaluated with moderate confidence that the actor threatened in advance to determine whether it is the purpose of ejection Messenger users and then use zero day to distribute harmful loads and operating data for purposes.

Vulnerability in question Cve-2025-27920The vulnerability of the catalog that affects the 2.0.62 version, which allows remote attackers to access and execute arbitrary files. The question was address With its developers SRIMAX as of the end of December 2024 with version 2.0.63. The company, however, does not mention the lack that is exploited in the wild in its advisory.

The attack network begins with the fact that the actor threats are accessed by the Servger Server Manager as an authentified user. Marble dust is believed to use methods such as DNS kidnapping or typical domains to intercept the credentials needed to authenticate.

The access is then abused to collect the Messenger conclusion credentials and use the CVE-2025-27920 to give up useful loads such as “om.VBS” and “omserverservice.vbs” to the server launch folder and omserverservice.exe.

In the next phase, the threatening actor uses “omserverservice.vbs” to cause “om.vbs” and “omserverservice.exe”, the latter of which is the back of the Golang, which contacts a solid domain (“Api.wordinfos (.) Com”

“On the client’s side, the installer highlights and performs both legitimate files outPutmessenger.exe, as well as omclientservice.exe, another back of Golang, which connects to the marble domain and control (C2),” Microsoft noted.

“This back first performs the connection check using the request to the C2 API.Wordinfos domain (.) Com. If this successfully, the second request is sent to the same C2 that contains information about the host name to clearly determine the victim.

Cybersecurity

In one case, the victim’s device with the Messenger client, installed by IP -Odars, which had previously been used by marble dust for a likely expressive data, participated.

The technological giant also noted that he discovered in the same version the second drawback, reflected the vulnerability of the scripts (XSS) (XSS) (in the same version (Cve-2025-27921) Although it states that it did not show evidence that he was armed with real attacks.

“This new attack signals a noticeable shift in the possibility of marble, while maintaining the sequence in their overall approach,” said Microsoft. “Successful use of the zero day feat suggests an increase in technical sophistication, and may also suggest that marble dust priorities have grown or that their operative goals have become more relevant.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Harmful Pack of Pypi, which poses as Solana Tool, stole the source code in 761 downloads

May 13, 2025

China associated with China, exploit SAP Cve-2025-31324 to break 581 critical systems worldwide

May 13, 2025

North Korean Horse, which is aimed at Ukraine with malware

May 13, 2025

Deepfake Protection in the II era

May 13, 2025

Moldovan police rate 4.5 million euros attack on Dutch Scientific Agency

May 13, 2025

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Harmful Pack of Pypi, which poses as Solana Tool, stole the source code in 761 downloads

May 13, 2025

China associated with China, exploit SAP Cve-2025-31324 to break 581 critical systems worldwide

May 13, 2025

North Korean Horse, which is aimed at Ukraine with malware

May 13, 2025

Deepfake Protection in the II era

May 13, 2025

Moldovan police rate 4.5 million euros attack on Dutch Scientific Agency

May 13, 2025

Türkiye Hackers operate the Messenger Zero-Day withdrawal to give up Golang Backdoors on Kurdish servers

May 13, 2025

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Harmful Pack of Pypi, which poses as Solana Tool, stole the source code in 761 downloads

May 13, 2025

China associated with China, exploit SAP Cve-2025-31324 to break 581 critical systems worldwide

May 13, 2025

North Korean Horse, which is aimed at Ukraine with malware

May 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.