• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Iranian Nation-State Actor “Mint Sandstorm” Weaponizes N-day Flaws

You are here: Home / General Cyber Security News / Iranian Nation-State Actor “Mint Sandstorm” Weaponizes N-day Flaws
April 19, 2023

A menace actor involved with Iranian country-point out hackers has been weaponizing N-day vulnerabilities, as very well as deploying new approaches to obtain environments of curiosity.

The threat actor is a sub-team of Mint Sandstorm – a gang also known as Phosphorus and involved with APT35, APT42, Charming Kitten and TA453 – reported an advisory released by Microsoft on Tuesday.

Read through far more about Phosphorus in this article: Iran Spear-Phishers Hijack Email Conversations in New Campaign

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“This Mint Sandstorm subgroup is technically and operationally experienced, capable of producing bespoke tooling and quickly weaponizing N-day vulnerabilities, and has demonstrated agility in its operational focus, which appears to align with Iran’s national priorities,” Microsoft wrote.

The tech large spelled out that, concerning late 2021 and mid 2022, the threat actor switched from reconnaissance to immediate attacks on US critical infrastructure, which involved seaports, electrical power businesses, transit systems and a substantial US utility and gasoline entity.

Among the the tactics utilized by the Mint Sandstorm subgroup is the adoption of publicly disclosed evidence-of-notion (POC) code to exploit flaws in internet-dealing with apps. 

“Until 2023, this subgroup had been slow to undertake exploits for just lately-disclosed vulnerabilities with publicly claimed POCs,” reads the advisory. “However, starting in early 2023, Microsoft noticed a notable lower in the time needed for this subgroup to adopt and include general public POCs.”

Additional, considering that 2022, the subgroup has commenced applying two customized .NET implants (dubbed Drokbk and Soldier) to achieve persistence on sufferer devices and download supplemental instruments.

“Microsoft has also noticed this Mint Sandstorm subgroup applying a unique attack chain involving very low-quantity phishing campaigns and a third custom made implant,” the organization explained.

Microsoft extra that the new intrusions attributed to the team are concerning as they let operators to conceal C2 communication, as nicely as persist in a compromised technique, and deploy various publish-compromise equipment with distinct abilities.

“A successful intrusion results in liabilities and could harm an organization’s status, primarily people dependable for offering providers to many others this sort of as critical infrastructure companies, which Mint Sandstorm has focused in the earlier.”

Microsoft suggested a series of mitigation rules to secure towards this Mint Sandstorm subgroup, which includes hardening internet-facing belongings and minimizing the attack area by using rules involved in the advisory.

Its publication arrives weeks soon after Secureworks disclosed facts about a new Iranian state-backed cyber-espionage campaign aimed at rooting out female human legal rights activists.


Some areas of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News #CYBERUK23: Threat Posed by ‘Irresponsible’ Use of Commercial Hacking Tools Increasing, NCSC Warns
Next Post: Small Business Interest in Cyber-Hygiene is Waning Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.