Turkish Hackers Gobble Up Zero-Day Exploit: Marbled Dust Strikes Again!

Marbled Dust, a Turkey-affiliated threat actor, is exploiting a zero-day vulnerability in Output Messenger against Kurdish military entities. Despite the flaw being patched, Marbled Dust remains persistent, deploying backdoors and executing arbitrary commands. Microsoft notes this reflects an increase in their technical sophistication, with their targeting priorities likely escalating.

Pro Dashboard

Hot Take:

Seems like Marbled Dust is taking the “Turkey Trot” to a whole new level by pirouetting through vulnerabilities faster than you can say “zero-day.” Who knew cyber espionage could be their new Thanksgiving hobby?

Key Points:

– Marbled Dust is exploiting a zero-day vulnerability in Output Messenger against the Kurdish military in Iraq.
– The group’s espionage targets are primarily in Europe and the Middle East, focusing on government and IT sectors.
– The exploited vulnerability, CVE-2025-27920, involves directory traversal, allowing unauthorized access to sensitive files.
– Marbled Dust uses compromised credentials, often obtained via DNS hijacking, to deploy backdoors and execute commands.
– A patch for the vulnerability was released in December 2024, with another related flaw still not actively exploited.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?