Malicious Campaign Targeting Diplomatic Assets
An Iranian-aligned spear-phishing campaign masquerading as Omani Ministry of Foreign Affairs communications targeted global government entities. The operation used compromised mailboxes to distribute malicious Word documents containing VBA macros. When executed, these macros decoded and deployed a payload named sysProcUpdate, which gathered system metadata and attempted to beacon to a command and control server. The campaign showed sophisticated techniques including anti-analysis measures, persistence mechanisms, and regional targeting across multiple countries. Evidence suggests this was part of a broader espionage effort by the Homeland Justice group associated with Iran's Ministry of Intelligence and Security, coinciding with heightened geopolitical tensions.
AI Analysis
Technical Summary
This threat describes a sophisticated spear-phishing campaign attributed to an Iranian-aligned threat actor group known as Homeland Justice, linked to Iran's Ministry of Intelligence and Security. The campaign impersonates communications from the Omani Ministry of Foreign Affairs to target global government entities, with a particular focus on diplomatic assets. The attack vector involves the use of compromised legitimate mailboxes to distribute malicious Microsoft Word documents embedded with VBA macros. Upon execution, these macros decode and deploy a payload named sysProcUpdate. This payload is designed to collect detailed system metadata and establish communication with a command and control (C2) server, enabling ongoing espionage activities. The campaign employs advanced techniques including anti-analysis measures to evade detection, persistence mechanisms to maintain foothold on infected systems, and regional targeting that spans multiple countries. The use of legitimate compromised mailboxes increases the likelihood of successful delivery and reduces suspicion. The campaign leverages multiple MITRE ATT&CK techniques such as spear-phishing attachments (T1566.001), execution through VBA macros (T1204.002), system information discovery (T1082), obfuscated files or information (T1027), process injection (T1055), and command and control over standard application layer protocols (T1571). Indicators of compromise include multiple file hashes and a suspicious domain (screenai.online) used for C2 communications. The campaign coincides with heightened geopolitical tensions, suggesting a strategic espionage motive targeting diplomatic communications and government operations.
Potential Impact
For European organizations, particularly government and diplomatic entities, this campaign poses a significant espionage risk. Successful compromise could lead to unauthorized disclosure of sensitive diplomatic communications, internal government strategies, and classified information, undermining national security and diplomatic relations. The persistence and anti-analysis capabilities of the malware increase the difficulty of detection and removal, potentially allowing long-term access to compromised networks. The use of spear-phishing and compromised legitimate mailboxes increases the attack's success probability, especially in environments where email security controls are not fully hardened. The campaign's targeting of multiple European countries indicates a broad interest in European diplomatic activities, which could result in intelligence gathering that affects policy decisions, international negotiations, and security postures. Additionally, the campaign could be a precursor to further disruptive or destructive operations if initial espionage objectives are met.
Mitigation Recommendations
1. Implement advanced email filtering solutions that incorporate reputation-based and heuristic analysis to detect spear-phishing attempts, especially those impersonating trusted government entities. 2. Enforce strict macro policies in Microsoft Office applications, such as disabling macros by default and only allowing macros signed by trusted publishers. 3. Conduct targeted user awareness training focused on recognizing spear-phishing emails, especially those that appear to come from diplomatic or governmental sources. 4. Monitor network traffic for unusual outbound connections, particularly to suspicious domains like 'screenai.online', and implement DNS filtering to block known malicious domains. 5. Deploy endpoint detection and response (EDR) solutions capable of detecting process injection, persistence mechanisms, and other advanced malware behaviors. 6. Regularly audit and secure email infrastructure to prevent mailbox compromise, including enforcing multi-factor authentication (MFA) and monitoring for anomalous mailbox activity. 7. Establish incident response playbooks specifically for spear-phishing and espionage-related intrusions, including rapid containment and forensic analysis. 8. Collaborate with national cybersecurity agencies and international partners to share threat intelligence and indicators of compromise for timely detection and response.
Affected Countries
Austria, France, Germany, Hungary, Italy, Netherlands, Romania, Spain, Sweden
Indicators of Compromise
- hash: 010375357db9327f9fe40d184f078c6b
- hash: 05d8f686dcbb6078f91f49af779e4572
- hash: 1d02fc206b89fedd6dd0df0e8d40c4c5
- hash: 20e7b9dcf954660555d511a64a07996f
- hash: 2c92c7bf2d6574f9240032ec6adee738
- hash: 2d57fcbc6a4695799aec15af4fa0a122
- hash: 394d12a01a9cef4ac279135e4c1c67a9
- hash: 3ac8283916547c50501eed8e7c3a77f0
- hash: 3d6f69cc0330b302ddf4701bbc956b8f
- hash: 6178f5819f8501611a521e19fbba74b0
- hash: 76fa8dca768b64aefedd85f7d0a33c26
- hash: 80e9105233f9d93df753a43291c2ab1a
- hash: b2c52fde1301a3624a9ceb995f2de411
- hash: f0ba41ce46e566f83db1ba3fc762fd9b
- domain: screenai.online
Malicious Campaign Targeting Diplomatic Assets
Description
An Iranian-aligned spear-phishing campaign masquerading as Omani Ministry of Foreign Affairs communications targeted global government entities. The operation used compromised mailboxes to distribute malicious Word documents containing VBA macros. When executed, these macros decoded and deployed a payload named sysProcUpdate, which gathered system metadata and attempted to beacon to a command and control server. The campaign showed sophisticated techniques including anti-analysis measures, persistence mechanisms, and regional targeting across multiple countries. Evidence suggests this was part of a broader espionage effort by the Homeland Justice group associated with Iran's Ministry of Intelligence and Security, coinciding with heightened geopolitical tensions.
AI-Powered Analysis
Technical Analysis
This threat describes a sophisticated spear-phishing campaign attributed to an Iranian-aligned threat actor group known as Homeland Justice, linked to Iran's Ministry of Intelligence and Security. The campaign impersonates communications from the Omani Ministry of Foreign Affairs to target global government entities, with a particular focus on diplomatic assets. The attack vector involves the use of compromised legitimate mailboxes to distribute malicious Microsoft Word documents embedded with VBA macros. Upon execution, these macros decode and deploy a payload named sysProcUpdate. This payload is designed to collect detailed system metadata and establish communication with a command and control (C2) server, enabling ongoing espionage activities. The campaign employs advanced techniques including anti-analysis measures to evade detection, persistence mechanisms to maintain foothold on infected systems, and regional targeting that spans multiple countries. The use of legitimate compromised mailboxes increases the likelihood of successful delivery and reduces suspicion. The campaign leverages multiple MITRE ATT&CK techniques such as spear-phishing attachments (T1566.001), execution through VBA macros (T1204.002), system information discovery (T1082), obfuscated files or information (T1027), process injection (T1055), and command and control over standard application layer protocols (T1571). Indicators of compromise include multiple file hashes and a suspicious domain (screenai.online) used for C2 communications. The campaign coincides with heightened geopolitical tensions, suggesting a strategic espionage motive targeting diplomatic communications and government operations.
Potential Impact
For European organizations, particularly government and diplomatic entities, this campaign poses a significant espionage risk. Successful compromise could lead to unauthorized disclosure of sensitive diplomatic communications, internal government strategies, and classified information, undermining national security and diplomatic relations. The persistence and anti-analysis capabilities of the malware increase the difficulty of detection and removal, potentially allowing long-term access to compromised networks. The use of spear-phishing and compromised legitimate mailboxes increases the attack's success probability, especially in environments where email security controls are not fully hardened. The campaign's targeting of multiple European countries indicates a broad interest in European diplomatic activities, which could result in intelligence gathering that affects policy decisions, international negotiations, and security postures. Additionally, the campaign could be a precursor to further disruptive or destructive operations if initial espionage objectives are met.
Mitigation Recommendations
1. Implement advanced email filtering solutions that incorporate reputation-based and heuristic analysis to detect spear-phishing attempts, especially those impersonating trusted government entities. 2. Enforce strict macro policies in Microsoft Office applications, such as disabling macros by default and only allowing macros signed by trusted publishers. 3. Conduct targeted user awareness training focused on recognizing spear-phishing emails, especially those that appear to come from diplomatic or governmental sources. 4. Monitor network traffic for unusual outbound connections, particularly to suspicious domains like 'screenai.online', and implement DNS filtering to block known malicious domains. 5. Deploy endpoint detection and response (EDR) solutions capable of detecting process injection, persistence mechanisms, and other advanced malware behaviors. 6. Regularly audit and secure email infrastructure to prevent mailbox compromise, including enforcing multi-factor authentication (MFA) and monitoring for anomalous mailbox activity. 7. Establish incident response playbooks specifically for spear-phishing and espionage-related intrusions, including rapid containment and forensic analysis. 8. Collaborate with national cybersecurity agencies and international partners to share threat intelligence and indicators of compromise for timely detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://dreamgroup.com/wp-content/uploads/2025/08/Dream_CTI_Analysis_Malicious_Campaign_by_MOIS_Targeting_Diplomatic_Assets.pdf"]
- Adversary
- null
- Pulse Id
- 68b87b6478ccea81579b86e1
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash010375357db9327f9fe40d184f078c6b | — | |
hash05d8f686dcbb6078f91f49af779e4572 | — | |
hash1d02fc206b89fedd6dd0df0e8d40c4c5 | — | |
hash20e7b9dcf954660555d511a64a07996f | — | |
hash2c92c7bf2d6574f9240032ec6adee738 | — | |
hash2d57fcbc6a4695799aec15af4fa0a122 | — | |
hash394d12a01a9cef4ac279135e4c1c67a9 | — | |
hash3ac8283916547c50501eed8e7c3a77f0 | — | |
hash3d6f69cc0330b302ddf4701bbc956b8f | — | |
hash6178f5819f8501611a521e19fbba74b0 | — | |
hash76fa8dca768b64aefedd85f7d0a33c26 | — | |
hash80e9105233f9d93df753a43291c2ab1a | — | |
hashb2c52fde1301a3624a9ceb995f2de411 | — | |
hashf0ba41ce46e566f83db1ba3fc762fd9b | — |
Domain
Value | Description | Copy |
---|---|---|
domainscreenai.online | — |
Threat ID: 68b89ee7ad5a09ad00f9f1a7
Added to database: 9/3/2025, 8:02:47 PM
Last enriched: 9/3/2025, 8:18:18 PM
Last updated: 9/4/2025, 1:55:21 AM
Views: 4
Related Threats
Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers
MediumEthereum smart contracts used to push malicious code on npm
MediumGoogle Salesforce Breach: A Deep dive into the chain and extent of the compromise
MediumNew malware campaign discovered via ManualFinder
MediumTax refund scam targets Californians
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.