Dust Specter APT Targets Government Officials in Iraq
A suspected Iran-nexus threat actor, dubbed Dust Specter, targeted Iraqi government officials in January 2026. The campaign involved impersonating Iraq's Ministry of Foreign Affairs and using compromised government infrastructure to host malicious payloads. Two attack chains were identified, utilizing previously undocumented malware including SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. The malware employed creative evasion techniques, leveraged generative AI for development, and used file-based polling mechanisms for command execution. The campaign also incorporated ClickFix-style attacks and social engineering lures. Attribution to an Iran-nexus group is based on code similarities, victimology, and overlapping tactics with known Iranian APT groups.
AI Analysis
Technical Summary
Dust Specter is a suspected Iran-nexus APT group that conducted a targeted cyber espionage campaign against Iraqi government officials in January 2026. The attackers impersonated the Iraqi Ministry of Foreign Affairs to increase credibility and used compromised government infrastructure to host malicious payloads, enhancing stealth and persistence. The campaign utilized two distinct attack chains deploying previously undocumented malware families: SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. These malware tools incorporate advanced evasion techniques, including file-based polling mechanisms for command execution, which reduce network detection opportunities. Notably, the malware development leveraged generative AI, indicating a novel approach to malware creation and adaptation. The campaign also employed ClickFix-style attacks, a known exploitation technique involving patching or fixing vulnerabilities in a way that aids malware persistence or privilege escalation. Social engineering was a key vector, with lures crafted to deceive high-value targets. Attribution to an Iranian-linked group is supported by code similarities, victimology focused on Iraqi government officials, and overlapping tactics, techniques, and procedures (TTPs) with known Iranian APT groups. The campaign demonstrates a high degree of operational security and technical sophistication, targeting sensitive government communications and data. No known public exploits or patches are available, and the malware families are newly identified, complicating detection and response efforts.
Potential Impact
The Dust Specter campaign poses significant risks to the confidentiality and integrity of sensitive government information in Iraq, potentially compromising diplomatic communications and national security data. Successful compromise of government officials' systems could enable espionage, data exfiltration, and long-term surveillance. The use of compromised government infrastructure for hosting malware increases the difficulty of detection and mitigation, potentially allowing the attackers to maintain persistence and evade traditional security controls. The innovative use of generative AI in malware development may accelerate the evolution of attack tools, making future variants harder to detect. The social engineering component increases the likelihood of successful initial compromise, especially in environments with limited cybersecurity awareness. While availability impact appears limited, the overall campaign threatens the operational security of targeted entities and could have cascading effects on regional stability and diplomatic relations. Organizations with similar profiles or geopolitical ties to Iraq and Iran may also be at risk of similar campaigns.
Mitigation Recommendations
Organizations should implement targeted threat hunting focused on detecting the specific malware families SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM, including monitoring for file-based polling behaviors and unusual command execution patterns. Enhancing email and communication security to detect and block social engineering lures is critical, including user training tailored to recognize impersonation of government entities. Network segmentation and strict access controls on government infrastructure can limit attackers' ability to host malicious payloads internally. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying novel malware and AI-generated code signatures. Regularly audit and monitor government infrastructure for unauthorized changes or suspicious activity, especially related to web servers and file hosting services. Collaborate with regional cybersecurity agencies to share intelligence and indicators of compromise (IOCs) once available. Given the use of generative AI in malware, invest in AI-based detection tools that can identify anomalous code patterns. Finally, develop incident response plans specifically addressing APT scenarios involving sophisticated evasion and persistence techniques.
Affected Countries
Iraq, Iran, United States, United Kingdom, Israel, Saudi Arabia, United Arab Emirates, Turkey
Indicators of Compromise
- hash: 19ab3fd2800f62a47bf13a4cc4e4c124
- hash: 63702bd6422ec2d5678d4487146ea434
- hash: 70a9b537b9b7e1b410576d798e6c5043
- hash: 78275f3fc7e209b85bff6a6f99acc68a
- hash: 7f17fa22feaced1a16d4d39c545cdb16
- hash: 809139c237c4062baecab43570060d67
- hash: 8f44262afaa171b78fc9be20a0fb0071
- hash: a7561eb023bb2c4025defcfe758d8ac2
- hash: aa887d32eb9467abba263920e55d6abe
- hash: b19add5ccaa17a1308993e6f3f786b06
- hash: b8254efd859f5420f1ce4060e4796c08
- hash: d5ddf40ba2506c57d3087d032d733e08
- hash: 1debc4c512ded889464e386739d5d2f61b87ff13
- hash: 369b56a89b2fce2cbdc36f5a23bdec6067242911
- hash: 51a746c85bd486f223130173b7e674379a51b694
- hash: 682c043443cb81b6c2fde8c5df43333f5d1fec53
- hash: 8621be9e1aa730d1ac8eb06fa8f66d9da70ff293
- hash: 8735ee29c409b8d101eb3170f011455be41b7a91
- hash: ad97e1bba1d040a237727afdb2787d6867d72b74
- hash: c79c261457def606c3393dde77c82832a5c0ded3
- hash: c7dff3a0675f330feb9a7c469f8340369451d122
- hash: cb1760c90fb6c399e0125c7aa793efe37c4ce533
- hash: df04e36c106691f9fe88e5798e4ae86438bd4f1d
- hash: fc08f8403849c6233978a363f4cdc58cd7041823
- hash: 293ee1fe8d36aa79cf1f64f5ddef402bc6939d229c6fca955c7b796119564779
- hash: 3a66ae5942f6feb79cf81ee70451f761253e0e0bde95f0840abdd42a804fad39
- hash: 69294ad90aeb7f05e501e7191c95beb14e23da5587dd75557c867e2944a57fdc
- hash: 6af71297ce7681e64d9a4c5449a7326f17f3f107cb7940ec5e0840390c457a47
- hash: 6bb0d45799076b3f2d7f602b978a0779868fc72a1188374f6919fbbfba23efce
- hash: 797325b3c8a9356dcace75d93cb5cfb7847d2049c66772d4cc2cee821618cb96
- hash: 903f7869a94d88d43b9140bb656f7bb86ef725efc78ef2ff9d12fd7c7c2aca74
- hash: a27d53608ab05b5c7cb86bcf4a273435238beeb7e7efd7845375b2aa765f51e2
- hash: ad26cd72a83b884a8bc5aaa87309683953e151ebb3fde42eda7bf9a4406e530d
- hash: eb5b7275c41de8e98d72696eeac9cba3719f334f8e7974e6b8760ece820b1d0c
- hash: f3f2dc31f70a105db161a5e7b463b2215d3cbd64ac0146fd68e39da1c279f7ef
- hash: fa51aff99d86a9f1f65aa0ebbf6ca40411d343cea59370851ab328b97e2164bb
- url: https://ca.iq/packages/mofaSurvey_20_30_oct.zip
- url: https://meetingapp.site/webexdownload
- url: https://meetingapp.site/webexdownload'
- domain: afterworld.store
- domain: girlsbags.shop
- domain: lecturegenieltd.pro
- domain: meetingapp.site
- domain: onlinepettools.shop
- domain: web14.info
- domain: web27.info
Dust Specter APT Targets Government Officials in Iraq
Description
A suspected Iran-nexus threat actor, dubbed Dust Specter, targeted Iraqi government officials in January 2026. The campaign involved impersonating Iraq's Ministry of Foreign Affairs and using compromised government infrastructure to host malicious payloads. Two attack chains were identified, utilizing previously undocumented malware including SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. The malware employed creative evasion techniques, leveraged generative AI for development, and used file-based polling mechanisms for command execution. The campaign also incorporated ClickFix-style attacks and social engineering lures. Attribution to an Iran-nexus group is based on code similarities, victimology, and overlapping tactics with known Iranian APT groups.
AI-Powered Analysis
Technical Analysis
Dust Specter is a suspected Iran-nexus APT group that conducted a targeted cyber espionage campaign against Iraqi government officials in January 2026. The attackers impersonated the Iraqi Ministry of Foreign Affairs to increase credibility and used compromised government infrastructure to host malicious payloads, enhancing stealth and persistence. The campaign utilized two distinct attack chains deploying previously undocumented malware families: SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. These malware tools incorporate advanced evasion techniques, including file-based polling mechanisms for command execution, which reduce network detection opportunities. Notably, the malware development leveraged generative AI, indicating a novel approach to malware creation and adaptation. The campaign also employed ClickFix-style attacks, a known exploitation technique involving patching or fixing vulnerabilities in a way that aids malware persistence or privilege escalation. Social engineering was a key vector, with lures crafted to deceive high-value targets. Attribution to an Iranian-linked group is supported by code similarities, victimology focused on Iraqi government officials, and overlapping tactics, techniques, and procedures (TTPs) with known Iranian APT groups. The campaign demonstrates a high degree of operational security and technical sophistication, targeting sensitive government communications and data. No known public exploits or patches are available, and the malware families are newly identified, complicating detection and response efforts.
Potential Impact
The Dust Specter campaign poses significant risks to the confidentiality and integrity of sensitive government information in Iraq, potentially compromising diplomatic communications and national security data. Successful compromise of government officials' systems could enable espionage, data exfiltration, and long-term surveillance. The use of compromised government infrastructure for hosting malware increases the difficulty of detection and mitigation, potentially allowing the attackers to maintain persistence and evade traditional security controls. The innovative use of generative AI in malware development may accelerate the evolution of attack tools, making future variants harder to detect. The social engineering component increases the likelihood of successful initial compromise, especially in environments with limited cybersecurity awareness. While availability impact appears limited, the overall campaign threatens the operational security of targeted entities and could have cascading effects on regional stability and diplomatic relations. Organizations with similar profiles or geopolitical ties to Iraq and Iran may also be at risk of similar campaigns.
Mitigation Recommendations
Organizations should implement targeted threat hunting focused on detecting the specific malware families SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM, including monitoring for file-based polling behaviors and unusual command execution patterns. Enhancing email and communication security to detect and block social engineering lures is critical, including user training tailored to recognize impersonation of government entities. Network segmentation and strict access controls on government infrastructure can limit attackers' ability to host malicious payloads internally. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying novel malware and AI-generated code signatures. Regularly audit and monitor government infrastructure for unauthorized changes or suspicious activity, especially related to web servers and file hosting services. Collaborate with regional cybersecurity agencies to share intelligence and indicators of compromise (IOCs) once available. Given the use of generative AI in malware, invest in AI-based detection tools that can identify anomalous code patterns. Finally, develop incident response plans specifically addressing APT scenarios involving sophisticated evasion and persistence techniques.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.zscaler.com/blogs/security-research/dust-specter-apt-targets-government-officials-iraq"]
- Adversary
- Dust Specter
- Pulse Id
- 69a5cc7cdc9811f61e3cde58
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash19ab3fd2800f62a47bf13a4cc4e4c124 | — | |
hash63702bd6422ec2d5678d4487146ea434 | — | |
hash70a9b537b9b7e1b410576d798e6c5043 | — | |
hash78275f3fc7e209b85bff6a6f99acc68a | — | |
hash7f17fa22feaced1a16d4d39c545cdb16 | — | |
hash809139c237c4062baecab43570060d67 | — | |
hash8f44262afaa171b78fc9be20a0fb0071 | — | |
hasha7561eb023bb2c4025defcfe758d8ac2 | — | |
hashaa887d32eb9467abba263920e55d6abe | — | |
hashb19add5ccaa17a1308993e6f3f786b06 | — | |
hashb8254efd859f5420f1ce4060e4796c08 | — | |
hashd5ddf40ba2506c57d3087d032d733e08 | — | |
hash1debc4c512ded889464e386739d5d2f61b87ff13 | — | |
hash369b56a89b2fce2cbdc36f5a23bdec6067242911 | — | |
hash51a746c85bd486f223130173b7e674379a51b694 | — | |
hash682c043443cb81b6c2fde8c5df43333f5d1fec53 | — | |
hash8621be9e1aa730d1ac8eb06fa8f66d9da70ff293 | — | |
hash8735ee29c409b8d101eb3170f011455be41b7a91 | — | |
hashad97e1bba1d040a237727afdb2787d6867d72b74 | — | |
hashc79c261457def606c3393dde77c82832a5c0ded3 | — | |
hashc7dff3a0675f330feb9a7c469f8340369451d122 | — | |
hashcb1760c90fb6c399e0125c7aa793efe37c4ce533 | — | |
hashdf04e36c106691f9fe88e5798e4ae86438bd4f1d | — | |
hashfc08f8403849c6233978a363f4cdc58cd7041823 | — | |
hash293ee1fe8d36aa79cf1f64f5ddef402bc6939d229c6fca955c7b796119564779 | — | |
hash3a66ae5942f6feb79cf81ee70451f761253e0e0bde95f0840abdd42a804fad39 | — | |
hash69294ad90aeb7f05e501e7191c95beb14e23da5587dd75557c867e2944a57fdc | — | |
hash6af71297ce7681e64d9a4c5449a7326f17f3f107cb7940ec5e0840390c457a47 | — | |
hash6bb0d45799076b3f2d7f602b978a0779868fc72a1188374f6919fbbfba23efce | — | |
hash797325b3c8a9356dcace75d93cb5cfb7847d2049c66772d4cc2cee821618cb96 | — | |
hash903f7869a94d88d43b9140bb656f7bb86ef725efc78ef2ff9d12fd7c7c2aca74 | — | |
hasha27d53608ab05b5c7cb86bcf4a273435238beeb7e7efd7845375b2aa765f51e2 | — | |
hashad26cd72a83b884a8bc5aaa87309683953e151ebb3fde42eda7bf9a4406e530d | — | |
hasheb5b7275c41de8e98d72696eeac9cba3719f334f8e7974e6b8760ece820b1d0c | — | |
hashf3f2dc31f70a105db161a5e7b463b2215d3cbd64ac0146fd68e39da1c279f7ef | — | |
hashfa51aff99d86a9f1f65aa0ebbf6ca40411d343cea59370851ab328b97e2164bb | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://ca.iq/packages/mofaSurvey_20_30_oct.zip | — | |
urlhttps://meetingapp.site/webexdownload | — | |
urlhttps://meetingapp.site/webexdownload' | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainafterworld.store | — | |
domaingirlsbags.shop | — | |
domainlecturegenieltd.pro | — | |
domainmeetingapp.site | — | |
domainonlinepettools.shop | — | |
domainweb14.info | — | |
domainweb27.info | — |
Threat ID: 69a717a5d1a09e29cb601ed4
Added to database: 3/3/2026, 5:17:25 PM
Last enriched: 3/3/2026, 5:33:17 PM
Last updated: 3/4/2026, 7:20:15 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-03-03
MediumFunnull Resurfaces: Exposing RingH23 Arsenal and MacCMS Supply Chain Attacks
MediumRedAlert Trojan Campaign: Fake Emergency Alert App Spread via SMS Spoofing Israeli Home Front Command
MediumSloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh
MediumThreat Brief: March 2026 Escalation of Cyber Risk Related to Iran
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.