Iran-linked hackers target Kurdish and Iraqi officials in long-running cyberespionage campaign

Avatar

A cyberespionage group with suspected ties to Iran has been targeting Kurdish and Iraqi government officials in a years-long cyber espionage campaign, according to a new report.

Researchers at the Slovak-based cybersecurity firm ESET attributed the activity to a threat actor dubbed BladedFeline, believed to be a subgroup of OilRig, a well-documented Iranian state-backed actor active since at least 2014.

According to ESET, BladedFeline has been operating since at least 2017, initially breaching systems belonging to the Kurdistan Regional Government (KRG). Since then, the hackers have continued to evolve their toolkit and expand their reach, targeting both the KRG and the central government of Iraq, as well as a telecommunications provider in Uzbekistan.

The group first came to ESET’s attention in 2023, when it deployed a simple backdoor known as Shahmaran against Kurdish diplomatic officials. The malware allowed remote attackers to upload and download files and execute commands on compromised devices.

Since then, ESET has identified two additional malicious tools linked to the group: Whisper and PrimeCache. Whisper communicates with attackers through email attachments sent via compromised Microsoft Exchange webmail accounts, while PrimeCache bears similarities to RDAT, a backdoor previously associated with OilRig.

While ESET could not confirm the initial intrusion vector in all cases, researchers believe BladedFeline may have gained access to Iraqi government systems by exploiting vulnerabilities in internet-facing servers, using a webshell called Flog to maintain control.

ESET warned that the group is likely to continue developing its malware arsenal to retain access to compromised systems for cyberespionage purposes.

“The KRG’s diplomatic relationship with Western nations, coupled with the oil reserves in the Kurdistan region, makes it an enticing target for Iran-aligned threat actors to spy on and potentially manipulate,” researchers said. 

“In Iraq, these threat actors are most probably trying to counter the influence of Western governments following the US invasion and occupation of the country.”

OilRig — also tracked as APT34 or Hazel Sandstorm — has previously targeted entities in the chemical, energy, finance, and telecom sectors across the Middle East. The group is known for using compromised organizations to conduct supply chain attacks on other government entities.

Last year, researchers warned that OilRig stepped up its attacks against government agencies in the United Arab Emirates (UAE) and the broader Persian Gulf region, underscoring their “ongoing commitment” to exploiting vulnerabilities within critical infrastructure and government networks in geopolitically sensitive areas.

CybercrimeGovernmentNewsNation-state
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials

Next Post

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack

Related Posts

Meta Adds Passkey Login Support to Facebook for Android and iOS Users

Meta Platforms on Wednesday announced that it's adding support for passkeys, the next-generation password standard, on Facebook. "Passkeys are a new way to verify your identity and login to your account that's easier and more secure than traditional passwords," the tech giant said in a post. Support for passkeys is expected to be available "soon" on Android and iOS mobile devices. The feature is
Avatar
Read More

Microsoft Patches 126 Flaws Including Actively Exploited Windows CLFS Vulnerability

Microsoft has released security fixes to address a massive set of 126 flaws affecting its software products, including one vulnerability that it said has been actively exploited in the wild. Of the 126 vulnerabilities, 11 are rated Critical, 112 are rated Important, and two are rated Low in severity. Forty-nine of these vulnerabilities are classified as privilege escalation, 34 as remote code
Avatar
Read More