Daily Dark Web
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
Daily Dark Web
No Result
View All Result
Home Cyber Attacks

Turkish Cyber Espionage Campaign Leverages Zero-Day in Output Messenger

May 13, 2025
Reading Time: 1 min read
Turkish Cyber Espionage Campaign Leverages Zero-Day in Output Messenger

A Turkish-affiliated threat actor, identified as “Marbled Dust,” has been exploiting a zero-day vulnerability in the Output Messenger application to conduct cyber espionage. The attacks, which reportedly began in April 2024, have primarily targeted entities in Europe and the Middle East, with a specific focus on Kurdish military personnel in Iraq and organizations with interests conflicting with the Turkish government. This campaign highlights a significant escalation in the group’s technical capabilities and operational urgency.

The core of the espionage activity revolves around a directory traversal vulnerability, tracked as CVE-2025-27920, found in Output Messenger, an enterprise communication platform developed by Indian company Srimax. Marbled Dust utilized techniques such as DNS hijacking to gain initial access to the Output Messenger Server Manager application. Subsequently, they exploited the zero-day flaw to upload malicious files, including GoLang-based backdoors, to the server’s startup directory. This allowed the attackers to steal sensitive data, impersonate users, and potentially disrupt operations.

In response to the threat, Microsoft Threat Intelligence notified Srimax, the developer of Output Messenger. Srimax has since released a software update (version 2.0.63) to address CVE-2025-27920 and a second cross-site scripting (XSS) vulnerability (CVE-2025-27921), although there is no evidence the latter was exploited. Both Microsoft and Srimax urge all Output Messenger users to upgrade to the latest version immediately to protect against these attacks. Security experts recommend implementing robust security measures, including enabling cloud-delivered protection and utilizing comprehensive vulnerability management systems.

Tags: CVE-2025-27920Cyber EspionageCyberSecuritydata-breachhackingKurdishMarbled DustMicrosoft Threat Intelligencenational securityOutput MessengerSoftware VulnerabilitySrimaxTurkish HackersZero-Day Vulnerability
ShareTweet

Related Posts

TBN Israel Allegedly Hacked by Handala Hacking Group
Cyber Attacks

TBN Israel Allegedly Hacked by Handala Hacking Group

June 16, 2025
Major Israeli Energy Companies Delkol and Delek Allegedly Breached by Handala Hacker Group
Cyber Attacks

Major Israeli Energy Companies Delkol and Delek Allegedly Breached by Handala Hacker Group

June 16, 2025
APTiran Allegedly Hits Israeli Critical Infrastructure with Ransomware
Cyber Attacks

APTiran Allegedly Hits Israeli Critical Infrastructure with Ransomware

June 16, 2025
Spanish Tech News Giant ADSLZone Defaced in Politically Motivated Attack
Cyber Attacks

Spanish Tech News Giant ADSLZone Defaced in Politically Motivated Attack

June 11, 2025
Evaly E-commerce Platform Allegedly Breached
Cyber Attacks

Evaly E-commerce Platform Allegedly Breached

May 23, 2025
NoName057(16)Targets Water Supply System in Spain
Cyber Attacks

NoName057(16)Targets Water Supply System in Spain

March 25, 2025
Next Post
Alleged Breach of Everest Bank Customer Database

Alleged Breach of Everest Bank Customer Database

China Census Database Allegedly Leaked with 92 Million Records

China Census Database Allegedly Leaked with 92 Million Records

Recommended Stories

Russian Railways Portal Allegedly Breached 570K Records Exposed

Russian Railways Portal Allegedly Breached 570K Records Exposed

March 25, 2025
IntelBroker Allegedly Breached Washington DC DMV and IAAI

IntelBroker Allegedly Breached Washington DC DMV and IAAI

March 26, 2025
A Threat Actor Claims Breach of Indonesian Ministry of Transportation Database

A Threat Actor Claims Breach of Indonesian Ministry of Transportation Database

August 21, 2024

Popular Stories

  • Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims to Have Leaked Database Containing Personal Information of 5 Million Salvadoran Citizens

    0 shares
    Share 0 Tweet 0
  • Deloitte Allegedly Suffers Major Data Breach – Source Code and GitHub Credentials Reportedly Leaked

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims Sale of State Grid Corporation of China (SGCC) Data, World’s Largest Utility Company

    0 shares
    Share 0 Tweet 0
  • New ATM Malware Threatens European Banking Security

    0 shares
    Share 0 Tweet 0
Daily Dark Web

Daily Dark Web© 2024

No Result
View All Result
  • Contact
  • Home
  • Newsletter
  • Privacy Policy

Daily Dark Web© 2024

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?