Current Cyber Threats

Marbled Dust Leverages Zero-Day in Output Messenger for Regional Espionage

Summary:
Microsoft Threat Intelligence identified a campaign by the Türkiye-linked espionage group Marbled Dust exploiting a zero-day vulnerability, CVE-2025-27920, in the Output Messenger chat platform. This vulnerability, found in the Output Messenger Server Manager application, allowed authenticated users to upload malicious files to the server’s startup directory via directory traversal. Marbled Dust used this exploit to deliver malicious scripts and backdoors, enabling data theft, impersonation, and surveillance across all users connected to the server. The attacks primarily targeted entities associated with the Kurdish military in Iraq, reflecting Marbled Dust’s ongoing focus on organizations that counter Turkish interests, including those in government, telecommunications, and IT sectors across Europe and the Middle East.

Microsoft reported the vulnerability to Output Messenger’s developer, Srimax, who released patches for CVE-2025-27920 and a second, unexploited flaw, CVE-2025-27921. The threat actor exploited its foothold by deploying two Visual Basic scripts and a GoLang-based backdoor named OMServerService.exe to the Output Messenger server, using its architecture to intercept communications and extract credentials.


Security Officer Comments:
Microsoft suspects that Marbled Dust obtained user authentication through DNS hijacking or typo-squatted domains, based on their past tactics. Once inside, the attackers collected user credentials, executed malicious scripts, and exfiltrated data, sometimes using plink, a PuTTY-based command-line SSH tool. The operation marks a significant escalation in Marbled Dust’s technical sophistication and underscores the need to update Output Messenger immediately to prevent further exploitation.


Suggested Corrections:
Microsoft recommends the following mitigations to reduce the impact of this threat. Check the recommendations card for the deployment status of monitored mitigations.


Strengthen operating environment configuration
Link(s):
https://www.microsoft.com/en-us/sec...y-in-output-messenger-for-regional-espionage/