Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    How to run RAG projects for better data analytics results

    October 13, 2025

    MacBook Air deal: Save 10% Apple’s slim M4 notebook

    October 13, 2025

    Part 1 – Energy as the Ultimate Bottleneck

    October 13, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
    IT/ Cybersecurity

    UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware

    big tee tech hubBy big tee tech hubSeptember 19, 2025006 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware

    An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies, successfully infiltrating 34 devices across 11 organizations as part of a recruitment-themed activity on LinkedIn.

    Swiss cybersecurity company PRODAFT is tracking the cluster under the name Subtle Snail. It’s assessed to be affiliated with Iran’s Islamic Revolutionary Guard Corps (IRGC). The targeted 11 companies are located in Canada, France, the United Arab Emirates, the United Kingdom, and the United States.

    “The group operates by posing as HR representatives from legitimate entities to engage employees, then compromises them through deployment of a MINIBIKE backdoor variant that communicates with command-and-control (C2) infrastructure proxied through Azure cloud services to bypass detection,” the company said in a report shared with The Hacker News.

    UNC1549 (aka TA455), believed to be active since at least June 2022, shares overlaps with two other Iranian hacking groups known as Smoke Sandstorm and Crimson Sandstorm (aka Imperial Kitten, TA456, Tortoiseshell, and Yellow Liderc). The threat actor was first documented by Google-owned Mandiant in February 2024.

    The use of job-themed lures by UNC1549 was subsequently detailed by Israeli cybersecurity company ClearSky, which detailed the adversary’s targeting of the aerospace industry as far back as September 2023 to deliver malware families such as SnailResin and SlugResin.

    “The group’s primary motivation involves infiltrating telecommunications entities while maintaining interest in aerospace and defense organizations to establish long-term persistence and exfiltrate sensitive data for strategic espionage purposes,” PRODAFT said.

    DFIR Retainer Services

    Attacks chains involve extensive reconnaissance on platforms like LinkedIn to identify key personnel within target organizations, specifically focusing on researchers, developers, and IT administrators with elevated access to critical systems and developer environments.

    In the next phase, the threat actors have been observed sending spear-phishing emails to validate the email addresses and collect additional information before enacting the crucial part of the operation – the fake recruitment drive.

    To accomplish this, the attackers set up convincing HR account profiles on LinkedIn and reached out to prospective targets with non-existent job opportunities, gradually building trust and credibility to increase the likelihood of success of the scheme. The campaign is characterized by the meticulous efforts of Subtle Snail operators to tailor the attack for each victim.

    Should the victim express interest in the offer, they are subsequently contacted via email to schedule a time for an interview by clicking on a fraudulent domain that mimics companies like Telespazio or Safran Group. Entering the necessary information automatically triggers the download of a ZIP archive.

    Present within the ZIP file is an executable that, once launched, uses DLL side-loading to launch a malicious DLL named MINIBIKE, which then gathers system information and awaits additional payloads in the form of Microsoft Visual C/C++ DLLs to conduct reconnaissance, log keystrokes and clipboard content, steal Microsoft Outlook credentials, collect web browser data from Google Chrome, Brave, and Microsoft Edge, and take screenshots.

    The web browser stealer, in particular, incorporates a publicly available tool called Chrome-App-Bound-Encryption-Decryption to bypass app-bound encryption protections rolled out by Google in order to decrypt and steal passwords stored in the browser.

    sn

    “The Subtle Snail team builds and deploys a victim-specific and unique DLL to the machine each time, even for collecting network configuration information from devices,” PRODAFT noted. “The malicious DLL files used by the threat actor exhibit similar characteristics in the export section.”

    “Legitimate DLL files are modified to facilitate a seamless execution of a DLL side-loading attack, where function names are substituted with direct string variables. This tactic allows the attacker to bypass typical detection mechanisms by manipulating the DLL’s export table, making it appear as a legitimate file while carrying out malicious activities.”

    MINIBIKE is a fully-featured, modular backdoor with support for 12 distinct commands to facilitate C2 communication, allowing it to enumerate files and directories, list running processes and terminate specific ones, upload files in chunks, as well as run exe, DLL, BAT, or CMD payloads.

    Besides blending its C2 traffic with regular cloud communications by using legitimate Azure cloud services and Virtual Private Servers (VPSes) as proxy infrastructure, the malware makes Windows Registry modifications such that it’s automatically loaded after system startup.

    It also features anti-debugging and anti-sandbox techniques to hinder analysis, and uses methods like Control Flow Flattening and custom hashing algorithms to resolve Windows API functions at runtime in an effort to resist reverse engineering and make it difficult to understand its overall functionality.

    CIS Build Kits

    “Subtle Snail’s operations cause serious damage by combining intelligence gathering with long-term access to critical telecommunications networks,” PRODAFT said. “They do not just infect devices; they actively search for sensitive data and ways to keep their access alive.”

    “They use predefined paths to guide their searches and focus on stealing emails, VPN configurations, and other information that helps them maintain control. They also hunt for confidential files stored in shared folders, which can expose business secrets and personal data.”

    MuddyWater’s Diversified Toolkit Exposed

    The disclosure comes as Group-IB sheds light on the infrastructure and malware toolset of another Iranian state-sponsored hacking group known as MuddyWater, which has “significantly” reduced its reliance on Remote Monitoring and Management (RMM) tools in favor of bespoke backdoors and tools like –

    uddy
    • BugSleep (First seen in May 2024), a Python-based backdoor designed to execute commands and facilitate file transfers
    • LiteInject (First seen in February 2025), a portable executable injector
    • StealthCache (First seen in March 2025), a feature-rich backdoor with capabilities to read/write files, terminate or restart itself, scan for security processes, and steal credential and files
    • Fooder (First seen in March 2025), a loader capable of loading, decrypting, and running an encrypted payload in memory
    • Phoenix (First seen in April 2025), a malware that’s used to deploy a stripped-down variant of BugSleep
    • CannonRat, a malicious tool designed for remote control of compromised systems
    • UDPGangster, a basic backdoor that communicates with its C2 server over the UDP protocol

    MuddyWater, active since 2017, is assessed to be a subordinate element within Iran’s Ministry of Intelligence and Security (MOIS). Also tracked as Boggy Serpens, Mango Sandstorm, and TA450, the threat actor has a history of targeting telecom, government, energy, defense, and critical infrastructure entities in the Middle East, with a newfound spike in attacks targeting Europe and the United States.

    “Recent activity shows that they still rely on phishing for delivery, leveraging maldocs with malicious macros for infection. Infrastructure analysis has revealed active use of Amazon Web Services (AWS) for hosting malicious assets, and Cloudflare services have been leveraged to hide infrastructure fingerprints and impede analysis,” Group-IB researcher Mansour Alhmoud said.

    “MuddyWater’s persistent campaigns underscore its role in supporting Iranian intelligence requirements while maintaining plausible deniability for state-directed cyber operations against both regional competitors and Western targets.”



    Source link

    Devices Firms Hacks job LinkedIn Lures Malware MINIBIKE Telecom UNC1549
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Inside the ‘Let’s Break It Down’ Series for Network Newbies

    October 13, 2025

    Trustwave Named a Leader in the IDC MarketScape:

    October 12, 2025

    WhatsApp Worm Targets Brazilian Banking Customers – Sophos News

    October 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    How to run RAG projects for better data analytics results

    October 13, 2025

    MacBook Air deal: Save 10% Apple’s slim M4 notebook

    October 13, 2025

    Part 1 – Energy as the Ultimate Bottleneck

    October 13, 2025

    From Static Products to Dynamic Systems

    October 13, 2025
    Advertisement
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    How to run RAG projects for better data analytics results

    October 13, 2025

    MacBook Air deal: Save 10% Apple’s slim M4 notebook

    October 13, 2025

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2025 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.