Cybersecurity researchers uncovered a sophisticated, Iran-linked spear-phishing operation that exploited a compromised Ministry of Foreign Affairs (MFA) mailbox in Oman to deliver malicious payloads to government entities worldwide.
Analysts attribute the operation to the “Homeland Justice” group, believed to be aligned with Iran’s Ministry of Intelligence and Security (MOIS).
Leveraging stolen diplomatic communications, encoded macros, and layered evasion techniques, the campaign underscores a renewed push for regional espionage amid heightened geopolitical tensions.
Diplomatic Lures with Malicious Macros
Attackers initiated the campaign by hijacking an official email account of the Omani MFA in Paris, sending messages that appeared to contain urgent multi-factor authentication (MFA) notices.
Recipients ranging from embassies and consulates to international organizations were urged to “Enable Content” to view purportedly legitimate Word documents.
Embedded within these attachments was a VBA macro dropper that reconstructed a binary payload from sequences of three-digit numbers stored in a hidden form control.
Upon document open, the macro executed a four-part chain:
- Delay and Anti-Analysis: A nested loop routine (
laylay
) triggered thousands of no-op iterations, stalling sandbox and dynamic analysis environments. - Payload Decoding: The function (
dddd
) parsed triplets of digits in a user form’s TextBox control into ASCII characters, recreating the binary of the malware executable. - Stealthy Drop and Execution: The decoded payload was written to
C:UsersPublicDocumentsManagerProc.log
—a seemingly innocuous log file—and launched hidden via a Shell command with error suppression. - Persistence and Cleanup: Further delays ensured the process completed quietly, and the macro’s simplistic error handlers concealed any failures.
This execution chain exemplifies classic macro-based delivery, yet the use of numeric encoding and deliberate delays elevated its stealth, allowing the attackers to bypass standard email security filters and sandbox inspections.
.webp)
Global Regional Espionage
A forensic review identified 270 spear-phishing emails sent from 104 unique Omani MFA addresses, indicating the campaign’s expansive reach.
Infrastructure logs revealed the use of NordVPN exit nodes in Jordan to obscure the true origin of messages. Targets spanned six global regions:
- Europe: Ten countries, 73 unique addresses.
- Africa: Twelve countries, 30 addresses.
- Asia: Seven countries, 25 addresses.
- Middle East: Seven countries, 20 addresses.
- Americas: Eleven countries, 35 addresses.
- International Organizations: Ten bodies, 12 addresses.
Europe emerged as the primary focus, while African missions also faced heavy targeting. The inclusion of prominent multilateral organizations—UN, UNICEF, World Bank—highlighted the attackers’ interest in strategic diplomacy and humanitarian networks.
Moreover, timing coincided with delicate regional negotiations, suggesting that intelligence gathering aimed to influence or anticipate diplomatic outcomes.
Evasion, Reconnaissance, and Next-Stage Risks
The dropped executable, dubbed sysProcUpdate, demonstrated further sophistication. It employed anti-analysis methods—such as custom unhandled exception filters and section packing—to complicate reverse engineering.
Once active, the malware harvested host metadata (username, computer name, administrative status), encrypted the information, and sent it via HTTPS POST to a command-and-control server (https://screenai.online/Home/
).
A beaconing loop ensured persistent connectivity attempts even when the server was unreachable.
To maintain a foothold, sysProcUpdate replicated itself to C:ProgramDatasysProcUpdate.exe
and altered Windows registry settings under DNS cache parameters, potentially enabling future lateral movement.
The attackers’ emphasis on reconnaissance suggests this initial wave aimed to map internal network topologies and identify high-value systems for subsequent exploitation.
Recommendations for Mitigation
- Indicator Blocking: Deny communications with
screenai.online
, and quarantine documents matching known hashes (e.g., those bearing the sysProcUpdate payload). - Macro Security Policies: Default Office installations to disable macros, and enforce strict signing requirements for any enabled macros.
- Network Monitoring: Inspect outbound POST traffic to unknown or unusual domains, and correlate with internal user activity.
- Registry Audits: Regularly verify critical DNS and TCP/IP registry keys for unauthorized modifications.
- VPN Traffic Analysis: Flag sudden spikes in VPN logins via nodes inconsistent with organizational norms, particularly exit nodes located in unaffected regions.
By combining robust email filtering, proactive network defenses, and user training to recognize deceptive macro lures, organizations can thwart this style of spear-phishing and limit an adversary’s ability to establish covert access for espionage or sabotage.
Indicators of Compromise (IoCs):
Type | Hash / Domain / URL | File / Resource Name |
---|---|---|
Domain | screenai[.]online | C2 domain |
URL | https://screenai.online/Home/ | Main C2 URL path (with dozens of sub-paths) |
DOC | b2c52fde1301a3624a9ceb995f2de4112d57fcbc6a4695799aec15af4fa0a122 | Online Seminar.FM.gov.om.dnr.doc |
DOC | 1c16b271c0c4e277eb3d1a7795d4746ce80152f04827a4f3c5798aaf4d51f6a1 | 1c16b271c0c4e277eb3d1a7795d4746ce80152f04827a4f3c5798aaf4d51f6a1.doc |
DOC | 2c92c7bf2d6574f9240032ec6adee738edddc2ba8d3207eb102eddf4ab963db0 | DPR for dredging in FreeSpan_16082025.2.doc |
DOC | 80e9105233f9d93df753a43291c2ab1a010375357db9327f9fe40d184f078c6b | DPR for dredging in FreeSpan_16082025.2.doc |
DOC | f0ba41ce46e566f83db1ba3fc762fd9b394d12a01a9cef4ac279135e4c1c67a9 | Seminar.MFA.gov.ct.tr-1.doc (copy) |
DOC | 02ccc4271362b92a59e6851ac6d5d2c07182064a602906d7166fe2867cc662a5 | Unknown malicious DOC |
Email (EML) | 05d8f686dcbb6078f91f49af779e4572ba1646a9c5629a1525e8499ab481dbf2 | EML2_d3ea22143ada4154bf5ea6077d7938f8.eml |
Email (EML) | 03828aebefde47bca0fcf0684ecae18aedde035c85f9d39edd2b7a147a1146fa | EML1_b83e249519684cd2ac40ad5fcfee687d.eml |
EXE | 76fa8dca768b64aefedd85f7d0a33c2693b94bdb55f40ced7830561e48e39c75 | sysProcUpdate.exe |
EXE | 1883db6de22d98ed00f8719b11de5bf1d02fc206b89fedd6dd0df0e8d40c4c56 | sysProcUpdate.exe |
EXE | 3ac8283916547c50501eed8e7c3a77f0ae8b009c7b72275be8726a5b6ae255e3 | sysProcUpdate.exe |
EXE | 3d6f69cc0330b302ddf4701bbc956b8fca683d1c1b3146768dcbce4a1a3932ca | sysProcUpdate.exe |
VBS Script | 20e7b9dcf954660555d511a64a07996f6178f5819f8501611a521e19fbba74b0 | ThisDocument.cls |
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
Source link