Zero-Day Mayday: Marbled Dust Hacks Kurdish Military via Output Messenger Flaw!

A Türkiye-linked APT group exploited an Output Messenger zero-day, targeting Kurdish military in Iraq since April 2024. Known as Marbled Dust, this group used CVE-2025-27920 to collect data and deploy malware, marking a shift in their technical abilities. Microsoft researchers observed data theft and user impersonation risks as the group infiltrated systems.

Pro Dashboard

Hot Take:

Well, it seems Marbled Dust is doing more than just gathering pebbles. This Türkiye-linked group has decided to take a stroll down the zero-day vulnerability lane, targeting Kurdish military users in Iraq. Clearly, they believe the early bird gets the worm (or the zero-day exploit), and they’re not wrong. It’s a classic case of ‘your app is my playground,’ and Marbled Dust is swinging from the monkey bars with glee. Who knew Output Messenger could output such chaos?

Key Points:

– Marbled Dust exploited a zero-day flaw, CVE-2025-27920, in Output Messenger.
– The group targets Kurdish military-linked users in Iraq since April 2024.
– The vulnerability allows directory traversal, leading to unauthorized data access.
– Attackers used DNS hijacking or typo-squatting to steal credentials.
– The attack marks a shift in Marbled Dust’s technical sophistication and urgency.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?