Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Iranian Hacking Group Nimbus Manticore Expands European Targeting
News

Iranian Hacking Group Nimbus Manticore Expands European Targeting

Team-CWDBy Team-CWDSeptember 23, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A long-running cyber-espionage campaign tied to Iran has intensified its operations in Europe. 

The group, known as Nimbus Manticore, has a history of targeting aerospace, telecommunications and defense industries in line with Iranian Revolutionary Guard Corps (IRGC) priorities.

Spear Phishing Surge in Europe

According to new findings by Check Point Research (CPR), the group’s latest wave of activity shows a shift toward Western Europe, with organizations in Denmark, Sweden and Portugal facing heightened risk.

Attackers pose as recruiters from well-known aerospace and telecommunications firms, directing victims to convincing but fraudulent career portals. Each target receives personalized login credentials, a tactic that allows close tracking of victims and tight control of access.

From there, attackers distribute malicious archives that launch a sophisticated, multi-stage infection process. This involves sideloading malicious DLL files into legitimate Windows executables, including Microsoft Defender components, to avoid detection.

Read more on Iranian cyber operations: MPs Warn of “Significant” Iranian Cyber-Threat to UK

Evolving Malware Toolkit

At the center of these campaigns is a family of custom backdoors. First identified as ‘Minibike’ in 2022, the malware has since evolved into new strains, notably ‘MiniJunk’ and ‘MiniBrowse.’ These tools enable attackers to exfiltrate files, steal browser credentials and issue remote commands while employing heavy obfuscation to resist analysis.

The malware shows advanced techniques such as:

  • Multi-stage DLL sideloading to evade normal security checks

  • Inflated binary sizes to bypass antivirus scans

  • Use of valid code-signing certificates from trusted providers

  • Compiler-level obfuscation that inserts junk code and encrypted strings

“The campaign reflects a mature, well-resourced actor prioritizing stealth, resiliency and operational security,” CPR said.

Cloud Infrastructure For Resilience

Nimbus Manticore relies heavily on cloud services to host its infrastructure, including domains registered under Azure App Service and shielded behind Cloudflare. This setup provides redundancy, allowing attackers to quickly re-establish command-and-control (C2) servers if one is taken down.

The campaign’s targeting is consistent with past operations against Israel and the Gulf states.

However, as mentioned above, CPR researchers recently noted a clear expansion toward Europe, with recent attacks tied to fake career portals impersonating aerospace and telecom companies. The sectors most at risk include:

  • Telecommunications, particularly satellite providers

  • Aerospace and aviation firms

  • Defense contractors

CPR’s analysis suggests the campaign remained active even during the 12-day conflict between Israel and Iran in mid-2025.

The ability to operate undetected through heavy obfuscation and use of legitimate infrastructure highlights the group’s growing sophistication.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
Next Article Critical Security Flaws Grow with AI Use, New Report Shows
Team-CWD
  • Website

Related Posts

News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

How cybercriminals are targeting content creators

November 26, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.