Vulnerability Management, Threat Intelligence

Output Messenger zero-day leveraged in ongoing cyberespionage campaign

binary code and magnifying glass

Trkiye-affiliated threat operation Marbled Dust has exploited a newly discovered directory traversal vulnerability in the multi-platform enterprise chat app Output Messenger, tracked as CVE-2025-27920, in attacks against Kurdish military-linked users in Iraq as part of a cyberespionage campaign that has been underway since April 2024, The Cyber Express reports.

Intrusions by Marbled Dust, also known as Sea Turtle and UNC1326, commenced with the potential usage of typosquatted login portals and DNS hijacking to infiltrate Output Messenger's Server Manager, which was then followed by an upload of a malicious VBS file to the Windows startup folder, a report from Microsoft Threat Intelligence showed. Such a file then abuses the flaw to launch a legitimate service-spoofing Golang backdoor that facilitates command-and-control domain communications, host data delivery, and additional command execution activities that allow data compromise. Such findings indicate the Marbled Dust, which has commonly exploited known security bugs in its attacks, may have been expanding its capabilities or scrambling to meet its operational goals, according to the report.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds