Camel Commotion: Cyber Espionage Flies High in UAE’s Aviation Sector!
A cyber-espionage campaign in the UAE, dubbed UNK_CraftyCamel, uses advanced polyglot files to sneak malware into aviation and satellite systems. With a backdoor named Sosano, the cunning attackers highlight their stealthy expertise—because nothing says “sneaky” like pretending to be an XLS file while secretly being a ZIP-filled party.

Hot Take:
In a wild twist of aviation drama, it’s not lost luggage or delayed flights that are causing turbulence, but rather cyber-spies sneaking into the cockpit of digital infrastructure. UNK_CraftyCamel is playing the long game, and they’ve got a backdoor tool that’s sneakier than a raccoon in a trash can. Looks like they’re setting their sights on the UAE, where they’re hoping to get more than just sand in their shoes—they want data, and lots of it!
Key Points:
- A cyber-espionage campaign by UNK_CraftyCamel is targeting aviation and satellite communications in the UAE.
- The attack uses a sophisticated infection chain with polyglot files to deploy the Sosano backdoor.
- Sosano is a Golang-written backdoor designed for stealth and command execution.
- Proofpoint hasn’t definitively linked UNK_CraftyCamel to existing threat actors, but similarities to Iranian groups are noted.
- Vigilance against LNK files and suspicious directories can help detect this malware.