Skip to main content

Malicious Campaign Targeting Diplomatic Assets

Medium
Published: Wed Sep 03 2025 (09/03/2025, 17:31:16 UTC)
Source: AlienVault OTX General

Description

An Iranian-aligned spear-phishing campaign masquerading as Omani Ministry of Foreign Affairs communications targeted global government entities. The operation used compromised mailboxes to distribute malicious Word documents containing VBA macros. When executed, these macros decoded and deployed a payload named sysProcUpdate, which gathered system metadata and attempted to beacon to a command and control server. The campaign showed sophisticated techniques including anti-analysis measures, persistence mechanisms, and regional targeting across multiple countries. Evidence suggests this was part of a broader espionage effort by the Homeland Justice group associated with Iran's Ministry of Intelligence and Security, coinciding with heightened geopolitical tensions.

AI-Powered Analysis

AILast updated: 09/03/2025, 20:18:18 UTC

Technical Analysis

This threat describes a sophisticated spear-phishing campaign attributed to an Iranian-aligned threat actor group known as Homeland Justice, linked to Iran's Ministry of Intelligence and Security. The campaign impersonates communications from the Omani Ministry of Foreign Affairs to target global government entities, with a particular focus on diplomatic assets. The attack vector involves the use of compromised legitimate mailboxes to distribute malicious Microsoft Word documents embedded with VBA macros. Upon execution, these macros decode and deploy a payload named sysProcUpdate. This payload is designed to collect detailed system metadata and establish communication with a command and control (C2) server, enabling ongoing espionage activities. The campaign employs advanced techniques including anti-analysis measures to evade detection, persistence mechanisms to maintain foothold on infected systems, and regional targeting that spans multiple countries. The use of legitimate compromised mailboxes increases the likelihood of successful delivery and reduces suspicion. The campaign leverages multiple MITRE ATT&CK techniques such as spear-phishing attachments (T1566.001), execution through VBA macros (T1204.002), system information discovery (T1082), obfuscated files or information (T1027), process injection (T1055), and command and control over standard application layer protocols (T1571). Indicators of compromise include multiple file hashes and a suspicious domain (screenai.online) used for C2 communications. The campaign coincides with heightened geopolitical tensions, suggesting a strategic espionage motive targeting diplomatic communications and government operations.

Potential Impact

For European organizations, particularly government and diplomatic entities, this campaign poses a significant espionage risk. Successful compromise could lead to unauthorized disclosure of sensitive diplomatic communications, internal government strategies, and classified information, undermining national security and diplomatic relations. The persistence and anti-analysis capabilities of the malware increase the difficulty of detection and removal, potentially allowing long-term access to compromised networks. The use of spear-phishing and compromised legitimate mailboxes increases the attack's success probability, especially in environments where email security controls are not fully hardened. The campaign's targeting of multiple European countries indicates a broad interest in European diplomatic activities, which could result in intelligence gathering that affects policy decisions, international negotiations, and security postures. Additionally, the campaign could be a precursor to further disruptive or destructive operations if initial espionage objectives are met.

Mitigation Recommendations

1. Implement advanced email filtering solutions that incorporate reputation-based and heuristic analysis to detect spear-phishing attempts, especially those impersonating trusted government entities. 2. Enforce strict macro policies in Microsoft Office applications, such as disabling macros by default and only allowing macros signed by trusted publishers. 3. Conduct targeted user awareness training focused on recognizing spear-phishing emails, especially those that appear to come from diplomatic or governmental sources. 4. Monitor network traffic for unusual outbound connections, particularly to suspicious domains like 'screenai.online', and implement DNS filtering to block known malicious domains. 5. Deploy endpoint detection and response (EDR) solutions capable of detecting process injection, persistence mechanisms, and other advanced malware behaviors. 6. Regularly audit and secure email infrastructure to prevent mailbox compromise, including enforcing multi-factor authentication (MFA) and monitoring for anomalous mailbox activity. 7. Establish incident response playbooks specifically for spear-phishing and espionage-related intrusions, including rapid containment and forensic analysis. 8. Collaborate with national cybersecurity agencies and international partners to share threat intelligence and indicators of compromise for timely detection and response.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://dreamgroup.com/wp-content/uploads/2025/08/Dream_CTI_Analysis_Malicious_Campaign_by_MOIS_Targeting_Diplomatic_Assets.pdf"]
Adversary
null
Pulse Id
68b87b6478ccea81579b86e1
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash010375357db9327f9fe40d184f078c6b
hash05d8f686dcbb6078f91f49af779e4572
hash1d02fc206b89fedd6dd0df0e8d40c4c5
hash20e7b9dcf954660555d511a64a07996f
hash2c92c7bf2d6574f9240032ec6adee738
hash2d57fcbc6a4695799aec15af4fa0a122
hash394d12a01a9cef4ac279135e4c1c67a9
hash3ac8283916547c50501eed8e7c3a77f0
hash3d6f69cc0330b302ddf4701bbc956b8f
hash6178f5819f8501611a521e19fbba74b0
hash76fa8dca768b64aefedd85f7d0a33c26
hash80e9105233f9d93df753a43291c2ab1a
hashb2c52fde1301a3624a9ceb995f2de411
hashf0ba41ce46e566f83db1ba3fc762fd9b

Domain

ValueDescriptionCopy
domainscreenai.online

Threat ID: 68b89ee7ad5a09ad00f9f1a7

Added to database: 9/3/2025, 8:02:47 PM

Last enriched: 9/3/2025, 8:18:18 PM

Last updated: 9/4/2025, 1:55:21 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats