Stealth Falcon Deploys New Backdoor on Middle Eastern Government Systems

In a concerning development, the advanced persistent threat (APT) actor known as Stealth Falcon has been observed deploying a new backdoor on the systems of a governmental entity in the Middle East. This APT actor, believed to have ties to the United Arab Emirates (UAE) government, is infamous for targeting journalists, activists, and dissidents. The recently discovered backdoor, named Deadglyph by ESET researchers, consists of a native x64 binary functioning as an executor, and a .NET assembly serving as an orchestrator.

Description of the backdoor

Deadglyph, the new backdoor deployed by Stealth Falcon, is delivered to the system in the form of a DLL that abuses Windows Management Instrumentation (WMI) event subscription for persistence. Once executed, the DLL loads, decrypts, and runs encrypted shellcode stored in the Windows registry. This process leads to the execution of the executor component of Deadglyph, enabling the APT actor to gain access and control over the compromised system.

Execution and functionality of the backdoor

Once the Deadglyph backdoor is activated, the APT actor communicates with it through a command and control (C&C) server, sending commands in the form of tasks. ESET estimates that the executor is capable of fetching up to fourteen different modules that serve as backdoor commands. Additionally, when these modules are executed, they are provided with an API resolution function that helps resolve Windows APIs and custom Executor APIs.

Function of the Executor Module

One of the key modules utilized by the Deadglyph backdoor is responsible for collecting extensive information about the compromised system. This particular module gathers data on various aspects, including the operating system, network adapters, installed applications, drivers, services, drives, processes, users, security software, and environment variables. By collecting this information, Stealth Falcon gains insights into the target’s infrastructure and potential vulnerabilities.

Link with previous Stealth Falcon activity

During their investigation into Deadglyph, ESET researchers made an intriguing discovery. They stumbled upon a CPL (Control Panel Item) file that was signed with an expired certificate. This file, which was uploaded to VirusTotal from a location in Qatar, served as a multi-stage shellcode downloader. Further analysis unveiled code similarities between this CPL file and Stealth Falcon’s backdoor, indicating a potential connection between the APT actor and the uploader in Qatar.

Background on Stealth Falcon

Stealth Falcon has been active since at least 2012 and is believed to be linked to the UAE government. This APT actor has gained notoriety for its relentless targeting of journalists, activists, and dissidents. With sophisticated tactics and extensive resources at their disposal, Stealth Falcon poses a significant threat to individuals and organizations striving for freedom of expression and human rights.

The deployment of the Deadglyph backdoor by Stealth Falcon on a Middle Eastern government entity’s systems raises serious concerns about the reach and capabilities of this APT actor. The discovery of the Deadglyph backdoor, along with its intricate execution and functionality, sheds light on the evolving tactics of Stealth Falcon. As cybersecurity professionals and organizations remain vigilant, it is crucial to monitor and address the activities of APT actors like Stealth Falcon to safeguard sensitive information, protect individuals at risk, and defend democratic values.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the