Article Details

Scrape Timestamp (UTC): 2025-11-18 14:38:46.229

Source: https://thehackernews.com/2025/11/iranian-hackers-use-deeproot-and.html

Original Article Text

Click to Toggle View

Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks. Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East. The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka Nimbus Manticore or Subtle Snail), which was first documented by the threat intelligence firm early last year. "Operating in late 2023 through 2025, UNC1549 employed sophisticated initial access vectors, including abuse of third-party relationships to gain entry (pivoting from service providers to their customers), VDI breakouts from third-parties, and highly targeted, role-relevant phishing," researchers Mohamed El-Banna, Daniel Lee, Mike Stokkel, and Josh Goddard said. The disclosure comes about two months after Swiss cybersecurity company PRODAFT tied the hacking group to a campaign targeting European telecommunications companies, successfully breaching 11 organizations in the process as part of a recruitment-themed social engineering attack via LinkedIn. The infection chains, per Google, involve a combination of phishing campaigns designed to steal credentials or distribute malware and leveraging trusted relationships with third-party suppliers and partners. The second approach signals a particularly clever strategy when striking defense contractors. While these organizations tend to have robust defenses, that may not be the case with third-party partners – a weak link in the supply chain that UNC1549 weaponizes to its advantage by first gaining access to a connected entity in order to infiltrate its main targets. Often, this entails abusing credentials associated with services like Citrix, VMWare, and Azure Virtual Desktop and Application (VDA) harvested from these external entities to establish an initial foothold and subsequently break out of the confines of the virtualized sessions to gain access to the underlying host system and initiate lateral movement activities within the target network. Another initial access pathway concerns the use of spear-phishing emails claiming to be related to job opportunities to lure recipients into clicking on bogus links and downloading malware to their machines. UNC1549 has also been observed targeting IT staff and administrators in these attacks to obtain credentials with elevated privileges that would grant them deeper access to the network. Once the attackers have found a way inside, the post-exploitation activity spans reconnaissance, credential harvesting, lateral movement, defense evasion, and information theft, systematically gathering network/IT documentation, intellectual property, and emails. Some of the custom tools put to use by the threat actor as part of this effort are listed below - Also utilized by the adversary are publicly available programs like AD Explorer to query Active Directory; Atelier Web Remote Commander (AWRC) to establish remote connections, perform reconnaissance, credential theft, and malware deployment; and SCCMVNC for remote control. Furthermore, the threat actor is said to have taken steps to stymie investigation by deleting RDP connection history registry keys. "UNC1549's campaign is distinguished by its focus on anticipating investigators and ensuring long-term persistence after detection," Mandiant said. "They plant backdoors that beacon silently for months, only activating them to regain access after the victim has attempted eradication." "They maintain stealth and command-and-control (C2) using extensive reverse SSH shells (which limit forensic evidence) and domains strategically mimicking the victim's industry."

Daily Brief Summary

NATION STATE ACTIVITY // Iranian Hackers Target Aerospace and Defense with Sophisticated Malware

Iranian-linked threat group UNC1549, also known as Nimbus Manticore, is actively targeting aerospace and defense sectors in the Middle East with advanced malware tools DEEPROOT and TWOSTROKE.

Mandiant reports that UNC1549 employs complex initial access strategies, including leveraging third-party relationships and virtual desktop infrastructure breakouts, to infiltrate target networks.

The group uses phishing campaigns and social engineering via LinkedIn to steal credentials and distribute malware, exploiting weak links in the supply chain to breach robustly defended organizations.

UNC1549 has successfully breached 11 European telecommunications firms, indicating a broader campaign scope beyond the Middle East, with a focus on recruitment-themed attacks.

Attackers target IT staff and administrators to obtain elevated credentials, facilitating deeper network access and enabling extensive post-exploitation activities, including reconnaissance and data theft.

The group employs tools like AD Explorer and Atelier Web Remote Commander for reconnaissance and credential theft, while using reverse SSH shells to maintain stealthy command-and-control operations.

UNC1549's tactics include deleting RDP connection history to hinder forensic investigations and planting dormant backdoors for long-term persistence, reactivating them post-eradication attempts.

The campaign's strategic use of industry-mimicking domains and silent beaconing backdoors highlights a sophisticated approach to maintaining access and evading detection.