Türkiye’s Marbled Dust Strikes Again: Zero-Day Exploit Hits Indian Platform, Targets Kurdish Military

Marbled Dust, a Türkiye-affiliated cyber espionage group, has used a zero-day vulnerability in Output Messenger to spy on Kurdish military targets in Iraq. Microsoft’s threat team warns this signals a boost in the group’s technical prowess. It’s like Marbled Dust went from script kiddies to evil tech wizards overnight!

Pro Dashboard

Hot Take:

It’s not every day you hear about a Türkiye-affiliated threat actor using a zero-day flaw to hack into an Indian communication platform to spy on targets in Iraq. This tale has more twists than a soap opera—and it appears Marbled Dust is the cyber equivalent of a reality TV villain, always upping their game and keeping us on the edge of our seats! Step aside, Kardashians, there’s a new plot twist in town!

Key Points:

  • A Türkiye-affiliated group known as Marbled Dust exploited a zero-day flaw in Output Messenger.
  • Targets included users linked to the Kurdish military in Iraq.
  • The flaw, CVE-2025-27920, was patched in December 2024.
  • Marbled Dust employs DNS hijacking and typosquatting for credential interception.
  • A second flaw, CVE-2025-27921, was found but not exploited.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?