By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
Computing

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

News Room
Last updated: 2026/03/05 at 7:27 AM
News Room Published 5 March 2026
Share
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
SHARE

Ravie LakshmananMar 05, 2026Malware / Threat Intelligence

A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country’s Ministry of Foreign Affairs to deliver a set of never-before-seen malware.

Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form of two different infection chains, culminate in the deployment of malware dubbed SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM.

“Dust Specter used randomly generated URI paths for command-and-control (C2) communication with checksum values appended to the URI paths to ensure that these requests originated from an actual infected system,” security researcher Sudeep Singh said. “The C2 server also utilized geofencing techniques and User-Agent verification.”

A notable aspect of the campaign is the compromise of the Iraqi government-related infrastructure to stage malicious payloads, not to mention the use of evasion techniques to delay execution and fly under the radar.

The first attack sequence begins with a password-protected RAR archive, within which there exists a .NET dropper named SPLITDROP, which acts as a conduit for TWINTASK, a worker module, and TWINTALK, a C2 orchestrator.

TWINTASK, for its part, is a malicious DLL (“libvlc.dll”) that’s sideloaded by the legitimate “vlc.exe” binary to periodically poll a file (“C:ProgramDataPolGuidin.txt”) every 15 seconds for new commands and run them using PowerShell. This also includes commands to establish persistence on the host via Windows Registry changes. The script output and errors are captured in a separate text file (“C:ProgramDataPolGuidout.txt”).

TWINTASK, upon first launch, is designed to execute another legitimate binary present in the extracted archive (“WingetUI.exe”), causing it to sideload the TWINTALK DLL (“hostfxr.dll”). Its primary goal is to reach out to the C2 server for new commands, coordinate tasks with TWINTASK, and exfiltrate the results back to the server. It supports the ability to write the command body from the C2 response to “in.txt,” as well as download and upload files.

“The C2 orchestrator works in parallel with the previously described worker module to implement a file-based polling mechanism used for code execution,” Singh said. “Upon execution, TWINTALK enters a beaconing loop and delays execution by a random interval before polling the C2 server for new commands.”

The second attack chain represents an evolution of the first, consolidating all the functionality of TWINTASK and TWINTALK into a single binary dubbed GHOSTFORM. It makes use of in-memory PowerShell script execution to run commands retrieved from the C2 server, thereby eliminating the need for writing artifacts to disk.

That’s not the only differentiating factor between the two attack chains. Some GHOSTFORM binaries have been found to embed a hard-coded Google Forms URL that’s automatically launched on the system’s default web browser once the malware begins execution. The form features content written in Arabic and masquerades as an official survey from Iraq’s Ministry of Foreign Affairs.

Zscaler’s analysis of the TWINTALK and GHOSTFORM source code has also uncovered the presence of placeholder values, emojis, and Unicode text, suggesting that generative artificial intelligence (AI) tools may have been used to assist with the malware’s development.

What’s more, the C2 domain associated with TWINTALK, “meetingapp[.]site,” is said to have been used by the Dust Specter actors in a July 2025 campaign to host a fake Cisco Webex meeting invitation page that instructs users to copy, paste, and run a PowerShell script to join the meeting. The instructions mirror a tactic widely seen in ClickFix-style social engineering attacks.

The PowerShell script, for its part, creates a directory on the host, and attempts to fetch an unspecified payload from the same domain and save it as an executable within the newly created directory. It also creates a scheduled task to run the malicious binary every two hours.

Dust Specter’s connections to Iran are based on the fact that Iranian hacking groups have a history of developing custom lightweight .NET backdoors to achieve their goals. The use of compromised Iraqi government infrastructure has been observed in past campaigns linked to threat actors like OilRig (aka APT34).

“This campaign, attributed with medium-to-high confidence to Dust Specter, likely targeted government officials using convincing social engineering lures impersonating Iraq’s Ministry of Foreign Affairs,” Zscaler said. “The activity also reflects broader trends, including ClickFix-style techniques and the growing use of generative AI for malware development.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Oh, the Fun We Had: A Behind-the-Scenes Look at CNET's MWC 2026 Oh, the Fun We Had: A Behind-the-Scenes Look at CNET's MWC 2026
Next Article Active Investors Spent More On Fewer Deals In February Active Investors Spent More On Fewer Deals In February
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Your future carrier support calls might go overseas much less often
Your future carrier support calls might go overseas much less often
News
AI agents also pay subscriptions
AI agents also pay subscriptions
Mobile
Building a Scalable Price Pipeline for Trading Systems | HackerNoon
Building a Scalable Price Pipeline for Trading Systems | HackerNoon
Computing
MacBook Neo Compatible With New Studio Displays, But There’s a Catch
MacBook Neo Compatible With New Studio Displays, But There’s a Catch
News

You Might also Like

Building a Scalable Price Pipeline for Trading Systems | HackerNoon
Computing

Building a Scalable Price Pipeline for Trading Systems | HackerNoon

1 Min Read
Washington state lawmakers target data center sales tax breaks to help plug B budget gap
Computing

Washington state lawmakers target data center sales tax breaks to help plug $2B budget gap

3 Min Read
AMD DCN 4.2 IP, GFX 12.1 Updates For AMDGPU Driver In Linux 7.1 Plus GCN 1.1 APU DC
Computing

AMD DCN 4.2 IP, GFX 12.1 Updates For AMDGPU Driver In Linux 7.1 Plus GCN 1.1 APU DC

2 Min Read
Why Nigeria’s loan apps are pulling back from small loans
Computing

Why Nigeria’s loan apps are pulling back from small loans

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?