Türkiye’s Marbled Dust Strikes Again: Zero-Day Exploit Hits Indian Platform, Targets Kurdish Military
Marbled Dust, a Türkiye-affiliated cyber espionage group, has used a zero-day vulnerability in Output Messenger to spy on Kurdish military targets in Iraq. Microsoft’s threat team warns this signals a boost in the group’s technical prowess. It’s like Marbled Dust went from script kiddies to evil tech wizards overnight!

Hot Take:
It’s not every day you hear about a Türkiye-affiliated threat actor using a zero-day flaw to hack into an Indian communication platform to spy on targets in Iraq. This tale has more twists than a soap opera—and it appears Marbled Dust is the cyber equivalent of a reality TV villain, always upping their game and keeping us on the edge of our seats! Step aside, Kardashians, there’s a new plot twist in town!
Key Points:
- A Türkiye-affiliated group known as Marbled Dust exploited a zero-day flaw in Output Messenger.
- Targets included users linked to the Kurdish military in Iraq.
- The flaw, CVE-2025-27920, was patched in December 2024.
- Marbled Dust employs DNS hijacking and typosquatting for credential interception.
- A second flaw, CVE-2025-27921, was found but not exploited.
Already a member? Log in here