Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Dust Specter APT Targets Government Officials in Iraq

0
Medium
Published: Mon Mar 02 2026 (03/02/2026, 17:44:28 UTC)
Source: AlienVault OTX General

Description

A suspected Iran-nexus threat actor, dubbed Dust Specter, targeted Iraqi government officials in January 2026. The campaign involved impersonating Iraq's Ministry of Foreign Affairs and using compromised government infrastructure to host malicious payloads. Two attack chains were identified, utilizing previously undocumented malware including SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. The malware employed creative evasion techniques, leveraged generative AI for development, and used file-based polling mechanisms for command execution. The campaign also incorporated ClickFix-style attacks and social engineering lures. Attribution to an Iran-nexus group is based on code similarities, victimology, and overlapping tactics with known Iranian APT groups.

AI-Powered Analysis

AILast updated: 03/03/2026, 17:33:17 UTC

Technical Analysis

Dust Specter is a suspected Iran-nexus APT group that conducted a targeted cyber espionage campaign against Iraqi government officials in January 2026. The attackers impersonated the Iraqi Ministry of Foreign Affairs to increase credibility and used compromised government infrastructure to host malicious payloads, enhancing stealth and persistence. The campaign utilized two distinct attack chains deploying previously undocumented malware families: SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. These malware tools incorporate advanced evasion techniques, including file-based polling mechanisms for command execution, which reduce network detection opportunities. Notably, the malware development leveraged generative AI, indicating a novel approach to malware creation and adaptation. The campaign also employed ClickFix-style attacks, a known exploitation technique involving patching or fixing vulnerabilities in a way that aids malware persistence or privilege escalation. Social engineering was a key vector, with lures crafted to deceive high-value targets. Attribution to an Iranian-linked group is supported by code similarities, victimology focused on Iraqi government officials, and overlapping tactics, techniques, and procedures (TTPs) with known Iranian APT groups. The campaign demonstrates a high degree of operational security and technical sophistication, targeting sensitive government communications and data. No known public exploits or patches are available, and the malware families are newly identified, complicating detection and response efforts.

Potential Impact

The Dust Specter campaign poses significant risks to the confidentiality and integrity of sensitive government information in Iraq, potentially compromising diplomatic communications and national security data. Successful compromise of government officials' systems could enable espionage, data exfiltration, and long-term surveillance. The use of compromised government infrastructure for hosting malware increases the difficulty of detection and mitigation, potentially allowing the attackers to maintain persistence and evade traditional security controls. The innovative use of generative AI in malware development may accelerate the evolution of attack tools, making future variants harder to detect. The social engineering component increases the likelihood of successful initial compromise, especially in environments with limited cybersecurity awareness. While availability impact appears limited, the overall campaign threatens the operational security of targeted entities and could have cascading effects on regional stability and diplomatic relations. Organizations with similar profiles or geopolitical ties to Iraq and Iran may also be at risk of similar campaigns.

Mitigation Recommendations

Organizations should implement targeted threat hunting focused on detecting the specific malware families SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM, including monitoring for file-based polling behaviors and unusual command execution patterns. Enhancing email and communication security to detect and block social engineering lures is critical, including user training tailored to recognize impersonation of government entities. Network segmentation and strict access controls on government infrastructure can limit attackers' ability to host malicious payloads internally. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying novel malware and AI-generated code signatures. Regularly audit and monitor government infrastructure for unauthorized changes or suspicious activity, especially related to web servers and file hosting services. Collaborate with regional cybersecurity agencies to share intelligence and indicators of compromise (IOCs) once available. Given the use of generative AI in malware, invest in AI-based detection tools that can identify anomalous code patterns. Finally, develop incident response plans specifically addressing APT scenarios involving sophisticated evasion and persistence techniques.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/dust-specter-apt-targets-government-officials-iraq"]
Adversary
Dust Specter
Pulse Id
69a5cc7cdc9811f61e3cde58
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash19ab3fd2800f62a47bf13a4cc4e4c124
hash63702bd6422ec2d5678d4487146ea434
hash70a9b537b9b7e1b410576d798e6c5043
hash78275f3fc7e209b85bff6a6f99acc68a
hash7f17fa22feaced1a16d4d39c545cdb16
hash809139c237c4062baecab43570060d67
hash8f44262afaa171b78fc9be20a0fb0071
hasha7561eb023bb2c4025defcfe758d8ac2
hashaa887d32eb9467abba263920e55d6abe
hashb19add5ccaa17a1308993e6f3f786b06
hashb8254efd859f5420f1ce4060e4796c08
hashd5ddf40ba2506c57d3087d032d733e08
hash1debc4c512ded889464e386739d5d2f61b87ff13
hash369b56a89b2fce2cbdc36f5a23bdec6067242911
hash51a746c85bd486f223130173b7e674379a51b694
hash682c043443cb81b6c2fde8c5df43333f5d1fec53
hash8621be9e1aa730d1ac8eb06fa8f66d9da70ff293
hash8735ee29c409b8d101eb3170f011455be41b7a91
hashad97e1bba1d040a237727afdb2787d6867d72b74
hashc79c261457def606c3393dde77c82832a5c0ded3
hashc7dff3a0675f330feb9a7c469f8340369451d122
hashcb1760c90fb6c399e0125c7aa793efe37c4ce533
hashdf04e36c106691f9fe88e5798e4ae86438bd4f1d
hashfc08f8403849c6233978a363f4cdc58cd7041823
hash293ee1fe8d36aa79cf1f64f5ddef402bc6939d229c6fca955c7b796119564779
hash3a66ae5942f6feb79cf81ee70451f761253e0e0bde95f0840abdd42a804fad39
hash69294ad90aeb7f05e501e7191c95beb14e23da5587dd75557c867e2944a57fdc
hash6af71297ce7681e64d9a4c5449a7326f17f3f107cb7940ec5e0840390c457a47
hash6bb0d45799076b3f2d7f602b978a0779868fc72a1188374f6919fbbfba23efce
hash797325b3c8a9356dcace75d93cb5cfb7847d2049c66772d4cc2cee821618cb96
hash903f7869a94d88d43b9140bb656f7bb86ef725efc78ef2ff9d12fd7c7c2aca74
hasha27d53608ab05b5c7cb86bcf4a273435238beeb7e7efd7845375b2aa765f51e2
hashad26cd72a83b884a8bc5aaa87309683953e151ebb3fde42eda7bf9a4406e530d
hasheb5b7275c41de8e98d72696eeac9cba3719f334f8e7974e6b8760ece820b1d0c
hashf3f2dc31f70a105db161a5e7b463b2215d3cbd64ac0146fd68e39da1c279f7ef
hashfa51aff99d86a9f1f65aa0ebbf6ca40411d343cea59370851ab328b97e2164bb

Url

ValueDescriptionCopy
urlhttps://ca.iq/packages/mofaSurvey_20_30_oct.zip
urlhttps://meetingapp.site/webexdownload
urlhttps://meetingapp.site/webexdownload'

Domain

ValueDescriptionCopy
domainafterworld.store
domaingirlsbags.shop
domainlecturegenieltd.pro
domainmeetingapp.site
domainonlinepettools.shop
domainweb14.info
domainweb27.info

Threat ID: 69a717a5d1a09e29cb601ed4

Added to database: 3/3/2026, 5:17:25 PM

Last enriched: 3/3/2026, 5:33:17 PM

Last updated: 3/4/2026, 7:20:15 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses