Stealth Falcon Deploys New Backdoor on Middle Eastern Government Systems

In a concerning development, the advanced persistent threat (APT) actor known as Stealth Falcon has been observed deploying a new backdoor on the systems of a governmental entity in the Middle East. This APT actor, believed to have ties to the United Arab Emirates (UAE) government, is infamous for targeting journalists, activists, and dissidents. The recently discovered backdoor, named Deadglyph by ESET researchers, consists of a native x64 binary functioning as an executor, and a .NET assembly serving as an orchestrator.

Description of the backdoor

Deadglyph, the new backdoor deployed by Stealth Falcon, is delivered to the system in the form of a DLL that abuses Windows Management Instrumentation (WMI) event subscription for persistence. Once executed, the DLL loads, decrypts, and runs encrypted shellcode stored in the Windows registry. This process leads to the execution of the executor component of Deadglyph, enabling the APT actor to gain access and control over the compromised system.

Execution and functionality of the backdoor

Once the Deadglyph backdoor is activated, the APT actor communicates with it through a command and control (C&C) server, sending commands in the form of tasks. ESET estimates that the executor is capable of fetching up to fourteen different modules that serve as backdoor commands. Additionally, when these modules are executed, they are provided with an API resolution function that helps resolve Windows APIs and custom Executor APIs.

Function of the Executor Module

One of the key modules utilized by the Deadglyph backdoor is responsible for collecting extensive information about the compromised system. This particular module gathers data on various aspects, including the operating system, network adapters, installed applications, drivers, services, drives, processes, users, security software, and environment variables. By collecting this information, Stealth Falcon gains insights into the target’s infrastructure and potential vulnerabilities.

Link with previous Stealth Falcon activity

During their investigation into Deadglyph, ESET researchers made an intriguing discovery. They stumbled upon a CPL (Control Panel Item) file that was signed with an expired certificate. This file, which was uploaded to VirusTotal from a location in Qatar, served as a multi-stage shellcode downloader. Further analysis unveiled code similarities between this CPL file and Stealth Falcon’s backdoor, indicating a potential connection between the APT actor and the uploader in Qatar.

Background on Stealth Falcon

Stealth Falcon has been active since at least 2012 and is believed to be linked to the UAE government. This APT actor has gained notoriety for its relentless targeting of journalists, activists, and dissidents. With sophisticated tactics and extensive resources at their disposal, Stealth Falcon poses a significant threat to individuals and organizations striving for freedom of expression and human rights.

The deployment of the Deadglyph backdoor by Stealth Falcon on a Middle Eastern government entity’s systems raises serious concerns about the reach and capabilities of this APT actor. The discovery of the Deadglyph backdoor, along with its intricate execution and functionality, sheds light on the evolving tactics of Stealth Falcon. As cybersecurity professionals and organizations remain vigilant, it is crucial to monitor and address the activities of APT actors like Stealth Falcon to safeguard sensitive information, protect individuals at risk, and defend democratic values.

Explore more

Can Hire Now, Pay Later Redefine SMB Recruiting?

Small and midsize employers hit a familiar wall: the best candidate says yes, the offer window is narrow, and a chunky placement fee threatens to slow the decision, so a financing option that spreads cost without slowing hiring becomes less a perk and more a competitive necessity. This analysis unpacks how buy now, pay later (BNPL) principles are migrating into

BNPL Boom in Canada: Perks, Pitfalls, and Guardrails

A checkout button promised to split a $480 purchase into four bite-sized payments, and within minutes the order shipped, approval arrived, and the budget looked strangely untouched despite a brand-new gadget heading to the door. That frictionless tap-to-pay experience has rocketed buy now, pay later (BNPL) from niche option to mainstream credit in Canada, as lenders embed plans into retailer

Omnichannel CRM Orchestration – Review

What Omnichannel CRM Orchestration Means for Hospitality Guests do not think in systems, yet their journeys throw off a blizzard of signals across email, SMS, chat, phone, and web, and omnichannel CRM orchestration promises to catch those signals in one place, interpret intent, and respond with the next right action before momentum fades. In hospitality, that means tying every touch

Can Stigma-Free Money Education Boost Workplace Performance?

Setting the Stage: Why Financial Stress at Work Demands Stigma-Free Education Paychecks stretched thin, phones buzzing with overdue alerts, and minds drifting during shifts point to a simple truth: money stress quietly drains focus long before it sparks a crisis. Recent findings sharpen the picture—PwC’s 2026 survey reported 59% of employees feel financially stressed and nearly half say pay lags

AI for Employee Engagement – Review

Introduction Stalled engagement scores, rising quit intents, and whiplash skill shifts ask a widely debated question: can AI really help people care more about work and change faster without losing trust? That question is no longer theoretical for large employers facing tighter budgets and nonstop transformation, and it frames this review of AI for employee engagement—a class of tools that