Iranian-Nexus Operation Targets Oman Ministries With Webshells, SQL Escalation, and Data Theft

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

A sophisticated cyber operation linked to an Iranian-nexus threat actor has quietly worked through at least 12 Omani government ministries, stealing tens of thousands of citizen records and leaving persistent backdoors behind.

The attackers used webshells, SQL server escalation, and old but effective exploits to move through government networks. What made the discovery possible was not a tip or a breach notification, but a simple oversight by the attackers.

The intrusion came to light when a staging server at 172.86.76[.]127, hosted on a VPS in the United Arab Emirates, was found with its directory wide open.

The entire toolkit, command and control code, session logs, and stolen data were all visible. The primary confirmed target was the Ministry of Justice and Legal Affairs, showing signs of active compromise as recently as April 10, 2026.

Analysts at Hunt.io identified the exposed server and documented the full scope of the operation, including the tools used, targets hit, and data stolen.

Their research points to a campaign consistent with Iranian state-sponsored activity, with overlaps seen in past operations linked to Iran’s Ministry of Intelligence and Security.

Oman has been targeted by Iranian-aligned hackers before. In 2025, a separate group compromised a mailbox at Oman’s Ministry of Foreign Affairs and used it to send phishing emails to embassies globally.

This latest campaign follows a similar direction, with a sharper focus on judicial records, immigration data, and citizen identity information.

Over 26,000 Ministry of Justice user records were pulled from the environment, along with judicial case data, committee decisions, and Windows registry hives containing internal credentials. A README file on the server labeled the machine as “VPS C2,” suggesting it was just one node within a larger, still-unidentified infrastructure.

Webshells, SQL Escalation, and a Wide Target Scope

Two webshells were central to this attack. The first, hc2.aspx, was recovered directly from the C2 server. The second, health_check_t.aspx, appeared hardcoded across every attack script targeting the Ministry of Justice network.

Commands were passed through a simple parameter, executed via Windows command processes, and output was returned as plain text to the attacker.

A dedicated folder on the server held 12 exploit scripts built for Omani government targets, covering Exchange email spraying, SQL server escalation, and memory-based execution designed to avoid writing files to disk.

Targets across 12 entities included the Royal Oman Police, Tax Authority, Civil Aviation Authority, Ministry of Finance, and the Office of Public Prosecution. Techniques ranged from ProxyShell exploitation to credential brute-forcing. The attacker also deployed GodPotato, a Windows privilege escalation tool, once inside the network.

Command Infrastructure and Iranian Nexus Ties

The C2 system ran on a Python HTTP server paired with a PowerShell beacon installed on the victim machine. The beacon checked in every 30 seconds, returning the victim’s domain, username, and hostname at the start of each session.

Stolen data was sent back in small encoded chunks to avoid triggering URL length limits. Logs confirm the active session on April 10, 2026 began at 03:00 UTC, with all traffic traced to the Ministry of Justice network.

Snippet of the C2 logs showing 26,596 MJLA user records extracted from the compromised system (Source – Hunt.io)

A neighboring cluster of domains on the same hosting network included a replica of a Persian-language diaspora media site and pages tied to censorship circumvention tools, patterns linked to Iranian state operations in the past.

Tooling overlaps with known Iranian-nexus groups APT34 and MuddyWater, both of which have targeted Middle Eastern governments using similar methods. Hunt.io stopped short of formal group attribution but placed the activity within the broader Iranian state-nexus space.

Monitoring exposed infrastructure in the window between attacker setup and cleanup remains one of the most practical ways to catch an active intrusion before critical data walks out the door.

IoCs:-

IP Address Resolving Domain(s) Hosting Provider
172.86.76[.]101 dubai-1.vaermb[.]com, regorixa[.]com RouterHosting LLC, UAE
172.86.76[.]94 dubai-2.vaermb[.]com RouterHosting LLC, UAE
172.86.76[.]108 dubai-3.vaermb[.]com, myjitsi.exceptionnotfound[.]ir RouterHosting LLC, UAE
172.86.76[.]112 dubai-4.vaermb[.]com, s5.sideliner[.]ir RouterHosting LLC, UAE
172.86.76[.]120 dubai-5.vaermb[.]com RouterHosting LLC, UAE
172.86.76[.]121 dubai-6.vaermb[.]com RouterHosting LLC, UAE
172.86.76[.]124 dubai-7.vaermb[.]com, suanefllix[.]com, brnettlix[.]com, brttfrixx[.]com, realprimefix[.]com, identificara[.]com RouterHosting LLC, UAE
172.86.76[.]127 dubai-10.vaermb[.]com RouterHosting LLC, UAE
172.86.76[.]129 dubai-8.vaermb[.]com RouterHosting LLC, UAE
172.86.76[.]130 dubai-9.vaermb[.]com RouterHosting LLC, UAE
45.59.114[.]60 shop.exceptionnotfound[.]ir, price.exceptionnotfound[.]ir, myjitsi.mrnajafipour[.]ir RouterHosting LLC, CH
104.21.27[.]95 tools.exceptionnotfound[.]ir Cloudflare
172.67.142[.]35 tools.exceptionnotfound[.]ir Cloudflare

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.