<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Exploit Forums - Ransomeware, Malware & Viruses]]></title>
		<link>https://exploitforums.net/</link>
		<description><![CDATA[Exploit Forums - https://exploitforums.net]]></description>
		<pubDate>Sun, 12 Apr 2026 23:12:25 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[BladedFeline malware hits middle eastern countries]]></title>
			<link>https://exploitforums.net/showthread.php?tid=6</link>
			<pubDate>Thu, 05 Jun 2025 20:16:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://exploitforums.net/member.php?action=profile&uid=2">Preeminence</a>]]></dc:creator>
			<guid isPermaLink="false">https://exploitforums.net/showthread.php?tid=6</guid>
			<description><![CDATA[In early 2024, cybersecurity researchers attributed a new wave of cyberattacks to <span style="font-style: italic;" class="mycode_i">BladedFeline</span>, an Iran-aligned hacking group believed to be a sub-cluster of the well-known Iranian APT group <span style="font-style: italic;" class="mycode_i">OilRig</span>. The group has been actively targeting Kurdish and Iraqi government officials, with operations dating back to at least 2017. According to ESET, which uncovered and analyzed the activity, BladedFeline focuses on long-term access and espionage, developing and deploying a range of custom malware to infiltrate and maintain control over high-value networks. The group has been linked to sophisticated backdoors such as <span style="font-style: italic;" class="mycode_i">Shahmaran</span>, <span style="font-style: italic;" class="mycode_i">Whisper</span>, <span style="font-style: italic;" class="mycode_i">Spearal</span>, and <span style="font-style: italic;" class="mycode_i">Optimizer</span>, as well as tunneling tools like <span style="font-style: italic;" class="mycode_i">Laret</span> and <span style="font-style: italic;" class="mycode_i">Pinar</span>, and the passive IIS module <span style="font-style: italic;" class="mycode_i">PrimeCache</span>. These tools are used to exfiltrate diplomatic and financial data, likely in alignment with Iranian strategic interests. Notably, attacks have also extended to telecommunications infrastructure in Uzbekistan and government systems in Azerbaijan. The campaign reflects a persistent and well-resourced effort to monitor and influence regional politics, particularly the Kurdish Regional Government's (KRG) relationships with Western powers and Iraq’s evolving post-conflict governance. While the initial access vector remains uncertain, the consistent targeting patterns underscore Iran’s continued reliance on cyber espionage as a means of projecting regional influence.]]></description>
			<content:encoded><![CDATA[In early 2024, cybersecurity researchers attributed a new wave of cyberattacks to <span style="font-style: italic;" class="mycode_i">BladedFeline</span>, an Iran-aligned hacking group believed to be a sub-cluster of the well-known Iranian APT group <span style="font-style: italic;" class="mycode_i">OilRig</span>. The group has been actively targeting Kurdish and Iraqi government officials, with operations dating back to at least 2017. According to ESET, which uncovered and analyzed the activity, BladedFeline focuses on long-term access and espionage, developing and deploying a range of custom malware to infiltrate and maintain control over high-value networks. The group has been linked to sophisticated backdoors such as <span style="font-style: italic;" class="mycode_i">Shahmaran</span>, <span style="font-style: italic;" class="mycode_i">Whisper</span>, <span style="font-style: italic;" class="mycode_i">Spearal</span>, and <span style="font-style: italic;" class="mycode_i">Optimizer</span>, as well as tunneling tools like <span style="font-style: italic;" class="mycode_i">Laret</span> and <span style="font-style: italic;" class="mycode_i">Pinar</span>, and the passive IIS module <span style="font-style: italic;" class="mycode_i">PrimeCache</span>. These tools are used to exfiltrate diplomatic and financial data, likely in alignment with Iranian strategic interests. Notably, attacks have also extended to telecommunications infrastructure in Uzbekistan and government systems in Azerbaijan. The campaign reflects a persistent and well-resourced effort to monitor and influence regional politics, particularly the Kurdish Regional Government's (KRG) relationships with Western powers and Iraq’s evolving post-conflict governance. While the initial access vector remains uncertain, the consistent targeting patterns underscore Iran’s continued reliance on cyber espionage as a means of projecting regional influence.]]></content:encoded>
		</item>
	</channel>
</rss>