Dust Specter Targets Iraqi Officials Using New SPLITDROP and GHOSTFORM Malware

jinia
By -

 

A suspected Iran-linked cyber threat group known as Dust Specter has launched a targeted cyber-espionage campaign against Iraqi government officials, deploying newly discovered malware strains including SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM.

Security researchers from Zscaler ThreatLabz detected the activity in January 2026, revealing a sophisticated attack chain that impersonates Iraq’s Ministry of Foreign Affairs to deliver malicious payloads.


Dust Specter Cyber Campaign Overview

The attackers use social engineering tactics and compromised Iraqi government infrastructure to distribute malware while avoiding detection.

According to security researcher Sudeep Singh, the malware communicates with command-and-control (C2) servers using randomly generated URI paths combined with checksum validation. This technique ensures that the communication originates from a legitimate infected system.

The attackers also deployed additional evasion techniques, including:

  •  Geofencing restrictions to limit access to specific regions
  • User-Agent verification to detect analysis environments
  • Execution delays to bypass automated detection systems

These techniques make the campaign particularly difficult for security teams to detect in early stages.


First Infection Chain: SPLITDROP, TWINTASK, and TWINTALK

The initial attack vector begins with a password-protected RAR archive sent to targets.

Inside the archive is a .NET-based dropper called SPLITDROP, which installs two additional components:

  • TWINTASK – a worker module responsible for executing commands 
  • TWINTALK – a command-and-control orchestration module

TWINTASK Worker Module

The TWINTASK malware is disguised as a malicious DLL named libvlc.dll. It is side-loaded by a legitimate VLC executable (vlc.exe), allowing attackers to run malicious code under the guise of trusted software.

Key behavior includes:

  •  Polling the file C:\ProgramData\PolGuid\in.txt every 15 seconds for commands
  • Executing commands using PowerShell
  • Capturing command output in C:\ProgramData\PolGuid\out.txt
  • Creating Windows Registry persistence mechanisms

This design allows attackers to remotely execute commands and maintain long-term access to compromised systems.

TWINTALK C2 Orchestrator

After deployment, TWINTASK launches another legitimate executable called WingetUI.exe, which loads the TWINTALK DLL (hostfxr.dll).

TWINTALK’s main functions include:

  •  Connecting to the attacker’s C2 server
  • Coordinating tasks with TWINTASK
  • Uploading stolen data
  • Downloading additional payloads

TWINTALK also enters a beaconing loop, periodically contacting the C2 server after random delays to retrieve new instructions.


Second Infection Chain: GHOSTFORM Malware

The attackers later introduced a more advanced variant called GHOSTFORM, which consolidates TWINTASK and TWINTALK capabilities into a single binary.

Unlike the earlier attack chain, GHOSTFORM executes PowerShell scripts entirely in memory, reducing forensic evidence on the system and increasing stealth.

Another unique feature of GHOSTFORM is the inclusion of a hard-coded Google Forms link that automatically opens in the victim’s browser during execution.

The form appears as an official survey from Iraq’s Ministry of Foreign Affairs, written in Arabic to increase credibility and deceive victims.


Signs of AI-Assisted Malware Development

During analysis of the TWINTALK and GHOSTFORM source code, researchers discovered unusual artifacts such as:

  •  Placeholder values
  • Emojis within the code
  • Unicode text fragments

These indicators suggest that generative AI tools may have assisted the attackers in developing portions of the malware code.


Links to Previous Dust Specter Campaigns

Security analysts also discovered that the command-and-control domain meetingapp[.]site had been used in an earlier campaign in July 2025.

In that operation, attackers hosted a fake Cisco Webex meeting page that instructed victims to copy and execute a malicious PowerShell script to join a meeting.

This tactic resembles ClickFix-style social engineering attacks, where victims unknowingly execute malicious commands themselves.

Once executed, the script:

  1.  Creates a hidden directory on the victim’s system
  2. Downloads a payload from the attacker’s domain
  3. Saves the payload as an executable file
  4. Creates a scheduled task running every two hours

This ensures persistent access for attackers.


Possible Iranian Threat Actor Connection

Cybersecurity experts believe Dust Specter may have links to Iranian threat actors, citing similarities in attack techniques.

Iranian groups have historically developed lightweight .NET-based backdoors for espionage campaigns.

Additionally, the use of compromised Iraqi government infrastructure mirrors tactics previously associated with OilRig, a well-known Iranian cyber-espionage group.