Stealth Falcon Deploys New Backdoor on Middle Eastern Government Systems

In a concerning development, the advanced persistent threat (APT) actor known as Stealth Falcon has been observed deploying a new backdoor on the systems of a governmental entity in the Middle East. This APT actor, believed to have ties to the United Arab Emirates (UAE) government, is infamous for targeting journalists, activists, and dissidents. The recently discovered backdoor, named Deadglyph by ESET researchers, consists of a native x64 binary functioning as an executor, and a .NET assembly serving as an orchestrator.

Description of the backdoor

Deadglyph, the new backdoor deployed by Stealth Falcon, is delivered to the system in the form of a DLL that abuses Windows Management Instrumentation (WMI) event subscription for persistence. Once executed, the DLL loads, decrypts, and runs encrypted shellcode stored in the Windows registry. This process leads to the execution of the executor component of Deadglyph, enabling the APT actor to gain access and control over the compromised system.

Execution and functionality of the backdoor

Once the Deadglyph backdoor is activated, the APT actor communicates with it through a command and control (C&C) server, sending commands in the form of tasks. ESET estimates that the executor is capable of fetching up to fourteen different modules that serve as backdoor commands. Additionally, when these modules are executed, they are provided with an API resolution function that helps resolve Windows APIs and custom Executor APIs.

Function of the Executor Module

One of the key modules utilized by the Deadglyph backdoor is responsible for collecting extensive information about the compromised system. This particular module gathers data on various aspects, including the operating system, network adapters, installed applications, drivers, services, drives, processes, users, security software, and environment variables. By collecting this information, Stealth Falcon gains insights into the target’s infrastructure and potential vulnerabilities.

Link with previous Stealth Falcon activity

During their investigation into Deadglyph, ESET researchers made an intriguing discovery. They stumbled upon a CPL (Control Panel Item) file that was signed with an expired certificate. This file, which was uploaded to VirusTotal from a location in Qatar, served as a multi-stage shellcode downloader. Further analysis unveiled code similarities between this CPL file and Stealth Falcon’s backdoor, indicating a potential connection between the APT actor and the uploader in Qatar.

Background on Stealth Falcon

Stealth Falcon has been active since at least 2012 and is believed to be linked to the UAE government. This APT actor has gained notoriety for its relentless targeting of journalists, activists, and dissidents. With sophisticated tactics and extensive resources at their disposal, Stealth Falcon poses a significant threat to individuals and organizations striving for freedom of expression and human rights.

The deployment of the Deadglyph backdoor by Stealth Falcon on a Middle Eastern government entity’s systems raises serious concerns about the reach and capabilities of this APT actor. The discovery of the Deadglyph backdoor, along with its intricate execution and functionality, sheds light on the evolving tactics of Stealth Falcon. As cybersecurity professionals and organizations remain vigilant, it is crucial to monitor and address the activities of APT actors like Stealth Falcon to safeguard sensitive information, protect individuals at risk, and defend democratic values.

Explore more

Agile Robots and Google DeepMind Partner for AI Automation

The sight of a robotic arm fluidly adjusting its grip to accommodate a fragile, oddly shaped component marks the end of an age defined by rigid, pre-programmed industrial machinery. While traditional automation relied on thousands of lines of static code to perform a single repetitive motion, a new alliance between Agile Robots and Google DeepMind is introducing a cognitive layer

The Rise of Careerfishing and Professional Deception in Hiring

The digital age has ushered in a sophisticated era of professional masquerading where jobseekers utilize carefully curated fictions to bypass traditional recruitment filters and secure roles for which they lack genuine qualifications. This phenomenon, increasingly known as careerfishing, mirrors the deceptive nature of online dating scams but targets the high-stakes world of corporate talent acquisition. It represents a deliberate, calculated

How Is HealthTech Redefining the Future of Talent Acquisition?

A single line of inefficient code in a modern clinical algorithm no longer just causes a screen to freeze; it can delay a life-saving diagnosis or disrupt the delicate flow of a decentralized clinical trial. In the high-stakes world of healthcare technology, the traditional boundaries of recruitment are dissolving as the industry shifts from a focus on static technical skills

AI Literacy Becomes the Fastest Growing Skill in HR

The traditional image of a human resources professional buried under a mountain of paper resumes and manual spreadsheets has vanished, replaced by a new breed of data-fluent strategist. Recent LinkedIn data reveals that AI-related competencies are now the fastest-growing additions to HR profiles across the globe, signaling a radical departure from the administrative roots of the profession. This surge in

Custom CRM Transforms Pharmaceutical Supply Chain Operations

A single delayed shipment of temperature-sensitive medicine can ripple through a healthcare network, yet many distributors still rely on the fragile logic of disconnected spreadsheets to manage their complex global inventories. In the high-stakes world of pharmaceutical logistics, the movement of life-saving goods requires more than just a warehouse; it demands a digital nervous system capable of tracking every pill