The Good, the Bad and the Ugly in Cybersecurity – Week 20
A zero-day vulnerability (CVE-2025-27920) in Output Messenger, a widely used internal communication platform, is actively exploited by the Marbled Dust cyberspy group targeting Kurdish military users in Iraq. The exploitation uses malicious binaries compromising both client and server components, enabling unauthorized access, espionage, data exfiltration, and persistent presence. No patch currently exists, and attacks remain targeted with no widespread exploitation reported. Additionally, a malicious obfuscated NPM package poses a significant supply chain risk to software development environments. Indicators such as the domain api. wordinfos. com are linked to attacker command and control infrastructure. European organizations using Output Messenger or similar platforms face latent risks of espionage and data breaches. The threat highlights the need for enhanced monitoring, supply chain security, and incident preparedness. Positive developments include botnet disruptions and ransomware arrests, but vigilance remains critical.
AI Analysis
Technical Summary
The threat centers on CVE-2025-27920, a zero-day vulnerability in Output Messenger, an internal communication platform widely adopted by organizations for secure messaging. The Marbled Dust threat group, known for cyberspy operations, is actively exploiting this vulnerability primarily against Kurdish military users in Iraq. The attack leverages malicious binaries, specifically omclientservice.exe and omserverservice.exe, to compromise both client and server components of the messaging platform. This compromise enables unauthorized access, persistent presence, espionage activities including data exfiltration, and command and control communications. The attackers maintain long-term access to targeted environments, demonstrating advanced capabilities. Currently, no patch or official mitigation is available, increasing risk for organizations using this software. Complementing this, a malicious obfuscated NPM package employing sophisticated obfuscation techniques involving Unicode and Google Calendar APIs has been discovered, posing a significant supply chain risk to software development environments. This malware can infiltrate development pipelines, leading to infections, data theft, and lateral movement within networks. Indicators such as the suspicious domain api.wordinfos.com are linked to the attackers’ command and control infrastructure. Although exploitation is currently targeted and not widespread, the presence of this zero-day in a widely used platform presents a latent risk to other organizations globally, including European entities. The report also notes positive law enforcement actions disrupting botnets and ransomware groups, but emphasizes ongoing vigilance due to the evolving threat landscape.
Potential Impact
The exploitation of CVE-2025-27920 allows attackers to gain unauthorized access to sensitive internal communications, compromising confidentiality, integrity, and availability of messaging services. Persistent presence enables long-term espionage, data exfiltration, and potential manipulation of communication content. Organizations using Output Messenger, especially those in military, governmental, or critical infrastructure sectors, face risks of targeted cyber espionage and operational disruption. The malicious NPM package threat extends risk to software development environments, potentially compromising software integrity, enabling lateral movement, and leading to data theft or further malware deployment. Although current exploitation is targeted at Kurdish military users in Iraq, the vulnerability's presence in a widely used platform poses a latent global risk, particularly for European organizations with geopolitical interests in the Middle East. The lack of a patch increases exposure duration, while the attackers’ use of obfuscated binaries and command and control infrastructure complicates detection and response efforts. Positive law enforcement actions provide some relief but do not eliminate ongoing risks.
Mitigation Recommendations
1. Conduct a comprehensive inventory of all Output Messenger deployments to identify vulnerable client and server components such as omclientservice.exe and omserverservice.exe. 2. Implement strict network segmentation and access controls around communication servers to limit lateral movement in case of compromise. 3. Monitor network traffic for suspicious outbound connections, especially to domains like api.wordinfos.com, indicative of command and control activity. 4. Deploy advanced endpoint detection and response (EDR) solutions with behavioral analytics capable of detecting multi-stage malware and obfuscated payloads, particularly in development environments using NPM packages. 5. Enforce strict code signing, integrity verification, and whitelisting for all third-party software dependencies, including NPM packages, to mitigate supply chain risks. 6. Increase user awareness and training focused on phishing and social engineering tactics that could deliver malware payloads. 7. Engage actively with threat intelligence sharing communities to receive timely updates on CVE-2025-27920 and Marbled Dust activities. 8. Prepare and regularly update incident response plans specifically addressing espionage and zero-day exploitation scenarios, including forensic readiness and communication protocols. 9. Consider migrating to alternative secure communication platforms with active patch management if Output Messenger cannot be secured promptly. 10. Regularly audit and harden DNS configurations to prevent DNS hijacking attempts linked to this threat.
Affected Countries
Iraq, Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, United States of America, Kosovo, Moldova
Indicators of Compromise
- cve: CVE-2025-27920
- domain: api.wordinfos.com
The Good, the Bad and the Ugly in Cybersecurity – Week 20
Description
A zero-day vulnerability (CVE-2025-27920) in Output Messenger, a widely used internal communication platform, is actively exploited by the Marbled Dust cyberspy group targeting Kurdish military users in Iraq. The exploitation uses malicious binaries compromising both client and server components, enabling unauthorized access, espionage, data exfiltration, and persistent presence. No patch currently exists, and attacks remain targeted with no widespread exploitation reported. Additionally, a malicious obfuscated NPM package poses a significant supply chain risk to software development environments. Indicators such as the domain api. wordinfos. com are linked to attacker command and control infrastructure. European organizations using Output Messenger or similar platforms face latent risks of espionage and data breaches. The threat highlights the need for enhanced monitoring, supply chain security, and incident preparedness. Positive developments include botnet disruptions and ransomware arrests, but vigilance remains critical.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The threat centers on CVE-2025-27920, a zero-day vulnerability in Output Messenger, an internal communication platform widely adopted by organizations for secure messaging. The Marbled Dust threat group, known for cyberspy operations, is actively exploiting this vulnerability primarily against Kurdish military users in Iraq. The attack leverages malicious binaries, specifically omclientservice.exe and omserverservice.exe, to compromise both client and server components of the messaging platform. This compromise enables unauthorized access, persistent presence, espionage activities including data exfiltration, and command and control communications. The attackers maintain long-term access to targeted environments, demonstrating advanced capabilities. Currently, no patch or official mitigation is available, increasing risk for organizations using this software. Complementing this, a malicious obfuscated NPM package employing sophisticated obfuscation techniques involving Unicode and Google Calendar APIs has been discovered, posing a significant supply chain risk to software development environments. This malware can infiltrate development pipelines, leading to infections, data theft, and lateral movement within networks. Indicators such as the suspicious domain api.wordinfos.com are linked to the attackers’ command and control infrastructure. Although exploitation is currently targeted and not widespread, the presence of this zero-day in a widely used platform presents a latent risk to other organizations globally, including European entities. The report also notes positive law enforcement actions disrupting botnets and ransomware groups, but emphasizes ongoing vigilance due to the evolving threat landscape.
Potential Impact
The exploitation of CVE-2025-27920 allows attackers to gain unauthorized access to sensitive internal communications, compromising confidentiality, integrity, and availability of messaging services. Persistent presence enables long-term espionage, data exfiltration, and potential manipulation of communication content. Organizations using Output Messenger, especially those in military, governmental, or critical infrastructure sectors, face risks of targeted cyber espionage and operational disruption. The malicious NPM package threat extends risk to software development environments, potentially compromising software integrity, enabling lateral movement, and leading to data theft or further malware deployment. Although current exploitation is targeted at Kurdish military users in Iraq, the vulnerability's presence in a widely used platform poses a latent global risk, particularly for European organizations with geopolitical interests in the Middle East. The lack of a patch increases exposure duration, while the attackers’ use of obfuscated binaries and command and control infrastructure complicates detection and response efforts. Positive law enforcement actions provide some relief but do not eliminate ongoing risks.
Mitigation Recommendations
1. Conduct a comprehensive inventory of all Output Messenger deployments to identify vulnerable client and server components such as omclientservice.exe and omserverservice.exe. 2. Implement strict network segmentation and access controls around communication servers to limit lateral movement in case of compromise. 3. Monitor network traffic for suspicious outbound connections, especially to domains like api.wordinfos.com, indicative of command and control activity. 4. Deploy advanced endpoint detection and response (EDR) solutions with behavioral analytics capable of detecting multi-stage malware and obfuscated payloads, particularly in development environments using NPM packages. 5. Enforce strict code signing, integrity verification, and whitelisting for all third-party software dependencies, including NPM packages, to mitigate supply chain risks. 6. Increase user awareness and training focused on phishing and social engineering tactics that could deliver malware payloads. 7. Engage actively with threat intelligence sharing communities to receive timely updates on CVE-2025-27920 and Marbled Dust activities. 8. Prepare and regularly update incident response plans specifically addressing espionage and zero-day exploitation scenarios, including forensic readiness and communication protocols. 9. Consider migrating to alternative secure communication platforms with active patch management if Output Messenger cannot be secured promptly. 10. Regularly audit and harden DNS configurations to prevent DNS hijacking attempts linked to this threat.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-6"]
- Adversary
- Marbled Dust
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2025-27920 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainapi.wordinfos.com | — |
Threat ID: 682c992c7960f6956616a37b
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 2/26/2026, 8:16:51 PM
Last updated: 3/21/2026, 8:49:24 PM
Views: 160
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.