Malicious Campaign Targeting Diplomatic Assets

Sept. 3, 2025, 8:14 p.m.

Description

An Iranian-aligned spear-phishing campaign masquerading as Omani Ministry of Foreign Affairs communications targeted global government entities. The operation used compromised mailboxes to distribute malicious Word documents containing VBA macros. When executed, these macros decoded and deployed a payload named sysProcUpdate, which gathered system metadata and attempted to beacon to a command and control server. The campaign showed sophisticated techniques including anti-analysis measures, persistence mechanisms, and regional targeting across multiple countries. Evidence suggests this was part of a broader espionage effort by the Homeland Justice group associated with Iran's Ministry of Intelligence and Security, coinciding with heightened geopolitical tensions.

Date

  • Created: Sept. 3, 2025, 5:31 p.m.
  • Published: Sept. 3, 2025, 5:31 p.m.
  • Modified: Sept. 3, 2025, 8:14 p.m.

Indicators

  • screenai.online

Additional Informations

  • Government
  • Malawi
  • Rwanda
  • Ethiopia
  • Mongolia
  • Nigeria
  • Hungary
  • Sweden
  • Austria
  • Qatar
  • Egypt
  • Colombia
  • Bangladesh
  • Jordan
  • United Arab Emirates
  • Netherlands
  • Argentina
  • Spain
  • Italy
  • Thailand
  • Peru
  • Canada
  • Japan
  • France
  • Germany
  • Romania
  • Oman
  • Bahrain
  • Israel
  • Brazil