Tuesday, April 29, 2025
HomeMalwareIranian APT Hackers Attack Government Organizations via Weaponized Excel Files to Steal...

Iranian APT Hackers Attack Government Organizations via Weaponized Excel Files to Steal Network Credentials

Published on

SIEM as a Service

Follow Us on Google News

Researchers observed a new malware called ForeLord from the Iranian APT hackers via weaponized MS excel document to attacker government organizations.

Iranian Threat group called COBALT ULSTER aka MuddyWater,  SeedwormTEMP.Zagros is behind this attack and believed to be a retaliation operation from Iran after a January 2, 2020, U.S. drone strike that kills Iran security Chief Soleimani.

We have reported last year about this same threat group were added a new set of latest exploits to their hacking arsenal and tactics, techniques and procedures (TTPs) to target government entities and telecommunication sectors.

- Advertisement - Google News

Researchers also observed a series of spearphishing campaigns that occurred between mid-2019 and mid-January 2020 targeted governmental organizations in Turkey, Jordan, Iraq.

ForeLord is a remote access trojan that often delivered via a malicious excel document that contains a Macro with a stealthy persistence mechanism.

ForeLord Infection Vectors

In the initial stage of the attack, Threat actors launching the spearphishing emails that deliver a ZIP archive containing malicious Excel files.

This malicious excel file uses as a Macro that helps to drop the ForeLord RAT, at the same time malicious document uses cmd.exe to execute a batch script to add a key in the registry to maintain the persistence in every time victims restart the system.

ForeLord
 malicious Excel file creating the ForeLord persistence mechanism.

Threat actors using DNS based command and control server to transfer the data and the name “Forelord” derived from one of the DNS responses “lordlordlordlord” in the part fo the C2 Protocol.

According to Secureworks research “The use of DNS tunneling means the requests are initially directed to legitimate DNS servers, which relay the requests to malicious nameservers controlled by the threat actors. Pivoting on elements of the C2 protocol, CTU researchers identified 14 additional domains possibly registered by COBALT ULSTER.”

ForeLord
Infection Chain (Source:SecureWorks)

Once the threat actors gained the initial access, they dropped several tools including PasswordDumper.exe, PASS32.dll, Mimikatz and more to collect credentials, test those credentials on the network, and create a reverse SSL tunnel to provide an additional access channel to the network.

Specifically, an open-source penetration testing tool is known as CredNinja.ps1 used in this attack to collected credentials or hashes.

Threat actors used a list of valid user accounts from the target domain in conjunction with a weak password list to determine potentially accessible accounts.”

Finally, they are using another tool called Secure Socket Funneling, a network tool and toolkit to forwards stolen data from multiple sockets through a single secure TLS tunnel to a remote computer.

Suggested Mitigation

Apply security updates to all systems, particularly those that are Internet-facing.

Protect user credentials within the environment through periodic user awareness training and multi-factor authentication (MFA). Employ MFA for remote access solutions and web-based email access, including Office365

As most of the observed Iranian intrusions involved malware or abuse of native system tools, employ endpoint detection technology that detects those types of activity.

Establish and test procedures for responding to denial of service activity. If appropriate, a distributed denial of service mitigation service provider can ensure continuity of Internet-facing services.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell...

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest...

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux...

New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials

A formidable new information-stealing malware dubbed Gremlin Stealer has surfaced in the cybercrime underground,...