PROBABLYPWNED
Threat IntelligenceMarch 7, 20264 min read

Iran-Linked Dust Specter APT Deploys AI-Assisted Malware Against Iraq

Zscaler uncovers Dust Specter campaign targeting Iraqi government officials with novel SPLITDROP and GHOSTFORM malware. Evidence suggests AI-assisted development.

Alex Kowalski

A suspected Iran-nexus threat actor dubbed Dust Specter has been targeting Iraqi government officials with a novel malware toolkit, according to research published by Zscaler ThreatLabz. The campaign, observed since January 2026, uses never-before-seen malware families including SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM.

Analysis of the source code reveals placeholder values, emojis, and Unicode text patterns that suggest generative AI tools assisted in the malware's development—a trend we're seeing more frequently in nation-state operations.

The Campaign

Dust Specter impersonates Iraq's Ministry of Foreign Affairs to deliver malicious payloads. The attackers send phishing emails with lures referencing official government business, enticing recipients to open weaponized documents.

The campaign uses two distinct attack chains:

Attack Chain 1 deploys the SPLITDROP dropper, which installs the TWINTASK and TWINTALK backdoors. TWINTASK handles initial system reconnaissance while TWINTALK maintains persistent command-and-control communication.

Attack Chain 2 delivers GHOSTFORM, a standalone remote access trojan with broader capabilities. Some GHOSTFORM variants embed hard-coded Google Forms URLs that launch automatically on execution—masquerading as official Ministry of Foreign Affairs surveys written in Arabic.

Technical Sophistication

The malware demonstrates several sophisticated evasion techniques. Dust Specter uses randomly generated URI paths for C2 communication, with checksum values appended to ensure requests originate from actual infected systems rather than security researchers.

The C2 infrastructure employs geofencing to only serve payloads to connections from Iraqi IP ranges, and verifies User-Agent strings to filter out automated analysis tools. This geographic targeting aligns with the campaign's focus on Iraqi government personnel.

GHOSTFORM's capabilities include:

  • File upload and download
  • Arbitrary command execution
  • Screenshot capture
  • Keylogging
  • Process enumeration
  • Persistence through scheduled tasks

AI-Assisted Development

What makes this campaign notable is evidence that AI coding tools were used during development. Researchers found:

  • Placeholder values with generic AI-style formatting
  • Emoji characters in code comments
  • Unicode text patterns consistent with LLM output
  • Code structure suggesting iterative AI assistance

This aligns with broader trends in threat actor tradecraft. We've previously covered how AI tools are lowering barriers for malware development, enabling less sophisticated groups to produce more capable implants.

The Pakistan-aligned group Transparent Tribe has also been observed embracing AI-powered coding tools, suggesting this is becoming standard practice across multiple threat actor ecosystems.

Geopolitical Context

Iran has maintained persistent cyber operations against Iraq for years, focusing on government, military, and critical infrastructure targets. The relationship between the two countries—complicated by shared borders, sectarian ties, and competing regional interests—makes Iraq a natural intelligence target for Tehran.

Dust Specter's focus on Ministry of Foreign Affairs personnel suggests interest in diplomatic communications, foreign policy deliberations, and relationships with Western governments. This is consistent with traditional espionage objectives.

The use of Google Forms as a social engineering mechanism is clever—government officials are accustomed to completing surveys and feedback forms, making this a plausible interaction that doesn't immediately raise suspicion.

Detection and Defense

Organizations dealing with Middle Eastern government affairs should be alert to this campaign. Key indicators include:

  1. Phishing emails impersonating Iraqi Ministry of Foreign Affairs
  2. Documents referencing official government correspondence
  3. Unexpected Google Forms links in executables
  4. C2 traffic with checksum-validated URI paths
  5. Geofenced payloads that only execute from specific IP ranges

For defenders, the geofencing presents both a challenge and opportunity. Security teams outside Iraq may have difficulty obtaining samples for analysis, but the geographic restrictions also mean most global organizations won't encounter the malware directly.

Those who do need to defend against Dust Specter should focus on phishing awareness training and email security controls. The initial access vector remains social engineering—block that, and the sophisticated post-exploitation toolkit becomes irrelevant.

What Comes Next

AI-assisted malware development isn't going away. As language models become more capable at code generation, we'll see more threat actors—both nation-state and criminal—incorporating these tools into their workflows.

The defensive community needs to adapt. Traditional signature-based detection struggles against AI-generated variants that produce unique code patterns on demand. Behavioral detection, anomaly analysis, and AI-assisted defense may be the necessary counterweight.

For now, Dust Specter represents the current state of the art in APT tradecraft: sophisticated evasion, targeted social engineering, and AI-augmented development. Expect others to follow.

Related Articles