Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

New Sosano Malware Campaign Target UAE

March 5, 2025
Reading Time: 2 mins read
in Alerts
Malicious Go Packages Target Linux and macOS

A newly discovered malware, dubbed Sosano, has been used in an espionage campaign targeting several organizations in the United Arab Emirates (UAE). These organizations, including those involved in aviation, satellite communications, and critical transportation infrastructure, have been infiltrated by a threat group identified as UNK_CraftyCamel. This group, suspected to be aligned with Iran and possibly connected to the Islamic Revolutionary Guard Corps (IRGC), has been targeting sectors that are essential for both the economic stability and national security of the UAE, which is a key player in the Middle East and often aligned with Saudi Arabia, a rival of Iran.

The attack campaign started in the fall of 2025, and the attackers used a compromised email account from Indian electronics company INDIC Electronics to send malicious emails to their victims.

These emails directed the targets to a fake website that appeared to be the Indian company’s legitimate domain, where the victims downloaded a ZIP archive containing executable files. These files, once opened, installed the Sosano backdoor, allowing the hackers to gain control over the infected machines and execute further malicious actions.

Researchers at Proofpoint have linked this attack to tactics previously used by Iranian-aligned hacking groups, such as the IRGC’s TA451 and TA455, which have a history of targeting aerospace-related organizations. However, Proofpoint differentiates UNK_CraftyCamel as a distinct threat group. The malware used in this campaign was highly customized for each target, with personalized malicious messages aimed at bypassing detection methods and evading traditional cybersecurity measures.

This method, referred to as supply chain compromise, leverages trusted relationships between organizations to gain access without raising suspicions.

This attack serves as a reminder of the lengths to which state-aligned actors are willing to go to fulfill their intelligence-gathering objectives. By leveraging business-to-business lures and compromising trusted suppliers or partners, attackers can bypass many traditional defense mechanisms. This campaign is part of a broader trend of suspected Iranian cyber activities, including earlier espionage efforts targeting the aerospace industry, which has seen similar tactics, such as the impersonation of recruiters on LinkedIn by another Iranian hacking group, TA455.

Reference:
  • Iran-Linked Hackers Target UAE Organizations with New Sosano Malware Campaign
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial