By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Output Messenger flaw exploited as zero-day in espionage attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Output Messenger flaw exploited as zero-day in espionage attacks
Tech News

Output Messenger flaw exploited as zero-day in espionage attacks

By admin 4 Min Read
Share
SHARE

A Türkiye-backed cyberespionage group exploited a zero-day vulnerability to attack Output Messenger users linked to the Kurdish military in Iraq.

Microsoft Threat Intelligence analysts who spotted these attacks also discovered the security flaw (CVE-2025-27920) in the LAN messaging application, a directory traversal vulnerability that can let authenticated attackers access sensitive files outside the intended directory or deploy malicious payloads on the server’s startup folder.

“Attackers could access files such as configuration files, sensitive user data, or even source code, and depending on the file contents, this could lead to further exploitation, including remote code execution,” Srimax, the app’s developer, explains in a security advisory issued in December when the bug was patched with the release of Output Messenger V2.0.63.

Microsoft revealed on Monday that the hacking group (also tracked as Sea Turtle, SILICON, and UNC1326) targeted users who hadn’t updated their systems to infect them with malware after gaining access to the Output Messenger Server Manager application.

After compromising the server, Marbled Dust hackers could steal sensitive data, access all user communications, impersonate users, gain access to internal systems, and cause operational disruptions.

“While we currently do not have visibility into how Marbled Dust gained authentication in each instance, we assess that the threat actor leverages DNS hijacking or typo-squatted domains to intercept, log, and reuse credentials, as these are techniques leveraged by Marbled Dust in previously observed malicious activity,” Microsoft said.

Next, the attackers deployed a backdoor (OMServerService.exe) onto the victims’ devices, which checked connectivity against an attacker-controlled command-and-control domain (api.wordinfos[.]com) and then provided the threat actors with additional information to identify each victim.

Attack chain
<em>Attack chain (Microsoft)</em>

​In one instance, the Output Messenger client on a victim’s device connected to an IP address linked to the Marbled Dust threat group, likely for data exfiltration, shortly after the attacker instructed the malware to collect files and archive them as a RAR archive.

Marbled Dust is known for targeting Europe and the Middle East, focusing on telecommunications and IT companies, as well as government institutions and organizations opposing the Turkish government.

To breach the networks of infrastructure providers, they’re scanning for vulnerabilities in internet-facing devices. They’re also exploiting their access to compromised DNS registries to change government organizations’ DNS server configurations, which allows them to intercept traffic and steal credentials in man-in-the-middle attacks.

“This new attack signals a notable shift in Marbled Dust’s capability while maintaining consistency in their overall approach,” Microsoft added. “The successful use of a zero-day exploit suggests an increase in technical sophistication and could also suggest that Marbled Dust’s targeting priorities have escalated or that their operational goals have become more urgent.”

Last year, Marbled Dust was also linked to multiple espionage campaigns targeting organizations in the Netherlands, mainly targeting telecommunications companies, internet service providers (ISPs), and Kurdish websites between 2021 and 2023.

Red Report 2025

Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

You Might Also Like

Five SETU scientists listed among world’s top 2pc on Stanford list

7 Key Workflows for Maximum Impact

At a Conspiracy Conference in Rural Ireland, Charlie Kirk Was the Star

Samsung Project Moohan gets Rumoured Release Date

How Nothing OS Uses AI to Personalize Your Digital World

TAGGED: Marbled Dust, Output Messenger, RCE, Remote Code Execution, Sea Turtle, Vulnerability, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article Metal stocks surge over 8% as US-China tariff truce lifts market sentiment
Next Article India and Pakistan face their latest crisis. Here’s a look at their history of armed conflict
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Five SETU scientists listed among world’s top 2pc on Stanford list
Tech News
Here’s why the US shutdown may prove more painful than past crises
Business
Black Ops 7 returns to Call of Duty's three-lane map design, and that's a good thing
Gaming News
7 Key Workflows for Maximum Impact
Tech News
Tesla vehicle sales made a comeback last quarter. Will a lost EV tax credit end the rebound?
Business
Thailand To Expand Crypto ETF Lineup Beyond Bitcoin In Early 2026 – Report
Crypto
At a Conspiracy Conference in Rural Ireland, Charlie Kirk Was the Star
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Five SETU scientists listed among world’s top 2pc on Stanford list

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Five SETU scientists listed among world’s top 2pc on Stanford list
October 3, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?