BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Nation-State Roundup: Iran-Nexus APT Targets Iraq Officials, Phobos Admin Pleads Guilty, Multi-Year Campaign Exposed

Nation-State Roundup: Iran-Nexus APT Targets Iraq Officials, Phobos Admin Pleads Guilty, Multi-Year Campaign Exposed

March 6, 2026Nation-State & APT2 min readhigh

Originally reported by Security Affairs, Palo Alto Unit 42

#apt#iran#iraq#phobos-ransomware#nation-state#malware#reconnaissance#credential-theft
Share

TL;DR

Iranian threat actors are actively targeting Iraqi government officials with previously unknown malware families, while law enforcement secured a guilty plea from a Phobos ransomware administrator. Separately, researchers uncovered a multi-year campaign targeting high-value sectors that went undetected for years.

Why high?

Iran-nexus APT actively targeting government officials with new malware families and multi-year undetected operations against critical sectors represent significant ongoing threats to national security and critical infrastructure.

Three significant developments highlight the evolving nation-state threat landscape: an active Iranian campaign against Iraqi government, successful prosecution of ransomware operators, and the discovery of a sophisticated multi-year espionage operation.

Iran-Nexus Dust Specter Deploys New Malware Against Iraqi Officials

Zscaler ThreatLabz researchers have identified an active campaign by the Iran-linked threat group Dust Specter targeting Iraqi government officials. The operation employs sophisticated social engineering, with attackers impersonating Iraq's Ministry of Foreign Affairs in phishing emails.

The campaign delivers three previously unknown malware families:

  • SPLITDROP: Initial payload dropper
  • TWINTASK: Task execution framework
  • TWINTALK: Communication module

The targeting of Iraqi government officials reflects Iran's ongoing strategic interest in regional influence operations. The deployment of custom malware families suggests significant resource investment and operational planning by the threat actors.

Russian National Pleads Guilty in Phobos Ransomware Operation

Russian national Evgenii Ptitsyn, 43, has pleaded guilty to wire fraud conspiracy charges related to his role in the Phobos ransomware operation. Ptitsyn faces up to 20 years in federal prison for his involvement in the scheme.

The defendant was arrested in South Korea in 2024 and subsequently extradited to the United States. The case demonstrates continued international law enforcement cooperation in pursuing ransomware operators, particularly those with ties to Russian criminal networks.

Phobos ransomware has been active since 2019, targeting organizations across multiple sectors including healthcare, education, and government entities. The successful prosecution represents a significant enforcement action against ransomware-as-a-service operations.

Multi-Year Campaign Against Critical Sectors Uncovered

Palo Alto Networks Unit 42 researchers have published detailed analysis of a threat cluster designated CL-UNK-1068, revealing years of undetected operations targeting high-value sectors. The campaign demonstrates sophisticated tradecraft including:

  • Advanced tunneling techniques for network persistence
  • Comprehensive reconnaissance capabilities
  • Credential theft and lateral movement tools

The prolonged timeline of undetected operations highlights the challenge of identifying sophisticated nation-state actors who prioritize stealth over speed. The targeting of critical sectors aligns with strategic intelligence collection objectives typically associated with nation-state threat actors.

Unit 42's research provides detailed technical analysis of the threat actor's toolset and tactics, techniques, and procedures (TTPs), enabling defensive teams to enhance detection capabilities.

Sources

  • https://securityaffairs.com/189033/apt/iran-nexus-apt-dust-specter-targets-iraq-officials-with-new-malware.html
  • https://securityaffairs.com/188984/security/phobos-ransomware-admin-faces-up-to-20-years-after-guilty-plea.html
  • https://unit42.paloaltonetworks.com/cl-unk-1068-targets-critical-sectors/

Originally reported by Security Affairs, Palo Alto Unit 42

Tags

#apt#iran#iraq#phobos-ransomware#nation-state#malware#reconnaissance#credential-theft

Threat Actors

🏴Phobos

Related Intelligence

  • Iranian APT Groups Intensify Cyber Operations Against U.S. and Middle East Infrastructure

    highMar 7, 2026
  • Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

    highFeb 23, 2026
  • Iranian Prayer App Compromised for US/Israeli Propaganda Campaign

    mediumMar 5, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Threat Landscape Roundup: Zero-Day Surge, State Actor Campaigns, and Multi-Million Dollar Fraud Operations

Next Article

LLM-Assisted Government Breach and Camera Hijacking in Modern Warfare →