The Türkiye-affiliated threat group Marbled Dust (also known as Sea Turtle/UNC1326) exploited a directory traversal vulnerability (CVE-2025-27920) in Output Messenger, a multi-platform enterprise chat application, to target Kurdish military-linked users in Iraq as part of a cyberespionage campaign active since April 2024. The attack chain involved typosquatted login portals and DNS hijacking to compromise Output Messenger’s Server Manager, followed by the deployment of a malicious VBS file in the Windows startup folder. This file abused the vulnerability to launch a legitimate-service-spoofing Golang backdoor, enabling C2 communications, host data exfiltration, and arbitrary command execution, leading to unauthorized data compromise.The breach suggests state-sponsored motives, with the threat actor expanding its capabilities to achieve operational objectives, likely for intelligence gathering or strategic disruption. The compromised military-linked communications pose risks of sensitive operational data exposure, potentially endangering regional security dynamics. The exploitation of a zero-day (or newly disclosed) vulnerability underscores the sophistication of the attack, with implications for geopolitical stability given the targeted demographic (Kurdish military personnel) and the actor’s affiliation (Türkiye).
Source: https://www.scworld.com/brief/output-messenger-zero-day-leveraged-in-ongoing-cyberespionage-campaign
TPRM report: https://www.rankiteo.com/company/17a-4
"id": "17a1182911113025",
"linkid": "17a-4",
"type": "Cyber Attack",
"date": "4/2024",
"severity": "100",
"impact": "8",
"explanation": "Attack that could bring to a war"
{'affected_entities': [{'customers_affected': 'Kurdish military-linked users '
'in Iraq',
'industry': 'technology/communication software',
'name': 'Output Messenger',
'type': 'enterprise chat application provider'}],
'attack_vector': ['typosquatted login portals',
'DNS hijacking',
'exploitation of CVE-2025-27920 (directory traversal)',
'malicious VBS file in Windows startup folder',
'Golang backdoor'],
'data_breach': {'data_exfiltration': True,
'sensitivity_of_data': 'high (military-linked)',
'type_of_data_compromised': ['host data',
'potentially military-linked '
'communications']},
'description': 'Trkiye-affiliated threat operation Marbled Dust (aka Sea '
'Turtle, UNC1326) exploited a directory traversal '
"vulnerability (CVE-2025-27920) in Output Messenger's Server "
'Manager as part of a cyberespionage campaign targeting '
'Kurdish military-linked users in Iraq since April 2024. The '
'attack involved typosquatted login portals, DNS hijacking, '
'and the deployment of a malicious VBS file in the Windows '
'startup folder. This file abused the vulnerability to launch '
'a Golang backdoor for C2 communications, host data '
'exfiltration, and command execution.',
'impact': {'data_compromised': ['host data',
'potentially sensitive military-linked '
'information'],
'systems_affected': ['Output Messenger Server Manager',
'Windows systems (via VBS file)',
'command-and-control (C2) infrastructure']},
'initial_access_broker': {'backdoors_established': ['Golang backdoor via '
'CVE-2025-27920'],
'entry_point': ['typosquatted login portals',
'DNS hijacking'],
'high_value_targets': ['Kurdish military-linked '
'users in Iraq']},
'investigation_status': 'reported by Microsoft Threat Intelligence (ongoing)',
'motivation': 'cyberespionage (targeting Kurdish military-linked users)',
'post_incident_analysis': {'root_causes': ['exploitation of unpatched '
'directory traversal vulnerability '
'(CVE-2025-27920)',
'use of typosquatted domains/DNS '
'hijacking for initial access']},
'references': [{'source': 'The Cyber Express'},
{'source': 'Microsoft Threat Intelligence'}],
'response': {'third_party_assistance': ['Microsoft Threat Intelligence '
'(reporting)']},
'threat_actor': ['Marbled Dust', 'Sea Turtle', 'UNC1326'],
'title': 'Marbled Dust Exploits CVE-2025-27920 in Output Messenger for '
'Cyberespionage Against Kurdish Military-Linked Users',
'type': ['cyberespionage', 'targeted attack'],
'vulnerability_exploited': 'CVE-2025-27920 (directory traversal in Output '
'Messenger)'}