Close Menu
globalcrimedesk.comglobalcrimedesk.com
    What's Hot

    Medicaid cuts could mean more drug overdose deaths : NPR

    India’s Waqf Amendment Act Threatens Muslim Land Endowments

    Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud

    Facebook X (Twitter) Instagram
    Trending
    • Medicaid cuts could mean more drug overdose deaths : NPR
    • India’s Waqf Amendment Act Threatens Muslim Land Endowments
    • Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud
    • The Frightening Fusion of Tech Power and State Power
    • How the Northwest’s Lagging Green Energy Push Could Affect Its Residents — ProPublica
    • Tariff doubts make Champagne-makers mull fleeing U.S. market : NPR
    • CIO des Jahres 2025 – jetzt mitmachen und bis Ende Mai bewerben
    • Nissan to cut 11,000 more jobs and shut seven factories
    Facebook X (Twitter) Instagram
    globalcrimedesk.comglobalcrimedesk.com
    • Home
    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention
    • Scandals
    • Terror
    • Trafficking
    globalcrimedesk.comglobalcrimedesk.com
    Home»Cyber»Output Messenger flaw exploited as zero-day in espionage attacks
    Cyber

    Output Messenger flaw exploited as zero-day in espionage attacks

    mediamillion1000@gmail.comBy [email protected]May 13, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Output Messenger flaw exploited as zero-day in espionage attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Output Messenger flaw exploited as zero-day in espionage attacks

    A Türkiye-backed cyberespionage group exploited a zero-day vulnerability to attack Output Messenger users linked to the Kurdish military in Iraq.

    Microsoft Threat Intelligence analysts who spotted these attacks also discovered the security flaw (CVE-2025-27920) in the LAN messaging application, a directory traversal vulnerability that can let authenticated attackers access sensitive files outside the intended directory or deploy malicious payloads on the server’s startup folder.

    “Attackers could access files such as configuration files, sensitive user data, or even source code, and depending on the file contents, this could lead to further exploitation, including remote code execution,” Srimax, the app’s developer, explains in a security advisory issued in December when the bug was patched with the release of Output Messenger V2.0.63.

    Microsoft revealed on Monday that the hacking group (also tracked as Sea Turtle, SILICON, and UNC1326) targeted users who hadn’t updated their systems to infect them with malware after gaining access to the Output Messenger Server Manager application.

    After compromising the server, Marbled Dust hackers could steal sensitive data, access all user communications, impersonate users, gain access to internal systems, and cause operational disruptions.

    “While we currently do not have visibility into how Marbled Dust gained authentication in each instance, we assess that the threat actor leverages DNS hijacking or typo-squatted domains to intercept, log, and reuse credentials, as these are techniques leveraged by Marbled Dust in previously observed malicious activity,” Microsoft said.

    Next, the attackers deployed a backdoor (OMServerService.exe) onto the victims’ devices, which checked connectivity against an attacker-controlled command-and-control domain (api.wordinfos[.]com) and then provided the threat actors with additional information to identify each victim.

    Attack chain
    Attack chain (Microsoft)

    ​In one instance, the Output Messenger client on a victim’s device connected to an IP address linked to the Marbled Dust threat group, likely for data exfiltration, shortly after the attacker instructed the malware to collect files and archive them as a RAR archive.

    Marbled Dust is known for targeting Europe and the Middle East, focusing on telecommunications and IT companies, as well as government institutions and organizations opposing the Turkish government.

    To breach the networks of infrastructure providers, they’re scanning for vulnerabilities in internet-facing devices. They’re also exploiting their access to compromised DNS registries to change government organizations’ DNS server configurations, which allows them to intercept traffic and steal credentials in man-in-the-middle attacks.

    “This new attack signals a notable shift in Marbled Dust’s capability while maintaining consistency in their overall approach,” Microsoft added. “The successful use of a zero-day exploit suggests an increase in technical sophistication and could also suggest that Marbled Dust’s targeting priorities have escalated or that their operational goals have become more urgent.”

    Last year, Marbled Dust was also linked to multiple espionage campaigns targeting organizations in the Netherlands, mainly targeting telecommunications companies, internet service providers (ISPs), and Kurdish websites between 2021 and 2023.

    Red Report 2025

    Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

    Attacks espionage exploited flaw Messenger Output zeroday
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Previous ArticleDonald Trump lands in Saudi Arabia as Gulf visit to seek economic deals begins – US politics live | Donald Trump
    Next Article London police arrest suspect for fire at Prime Minister Keir Starmer’s old home : NPR
    [email protected]
    • Website

    Related Posts

    Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud

    May 13, 2025

    CIO des Jahres 2025 – jetzt mitmachen und bis Ende Mai bewerben

    May 13, 2025

    M&S says customer data stolen in cyberattack, forces password resets

    May 13, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Posts

    Medicaid cuts could mean more drug overdose deaths : NPR

    India’s Waqf Amendment Act Threatens Muslim Land Endowments

    Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud

    The Frightening Fusion of Tech Power and State Power

    Trending Posts

    Medicaid cuts could mean more drug overdose deaths : NPR

    May 13, 2025

    India’s Waqf Amendment Act Threatens Muslim Land Endowments

    May 13, 2025

    Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud

    May 13, 2025

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    News

    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention

    Company

    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy policy
    • Terms & Condition
    Recent Posts
    • Medicaid cuts could mean more drug overdose deaths : NPR
    • India’s Waqf Amendment Act Threatens Muslim Land Endowments

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 globalcrimedesk. Designed by Pro.
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    Type above and press Enter to search. Press Esc to cancel.