Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    Google TPU Chips Threatens Nvidia’s GPU Dominance

    January 13, 2026

    Cybersecurity Funding Increases as AI-Driven Threats Become More Sophisticated 

    January 12, 2026

    Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

    January 10, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      Google TPU Chips Threatens Nvidia’s GPU Dominance

      January 13, 2026

      Nvidia in Talks to Acquire AI21 Labs in $3B Generative AI Deal

      January 8, 2026

      Google Centralizes AI Development Around Gemini as Partners Prepare AI Vision Launch at CES 2026

      January 8, 2026

      Nvidia Aims to Begin H200 Chip Shipments to China by Mid-February

      January 7, 2026

      Cisco in Advanced Talks to Acquire Cybersecurity Startup Axonius for $2 billion

      January 7, 2026
    • Crypto

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026

      Tether Faces Ongoing Transparency Questions and Reserve Scrutiny Amid Massive Bitcoin Accumulation

      January 5, 2026

      Kanye West YZY Coin Crash Follows $3B Hype Launch

      August 24, 2025

      Crypto Markets Rally as GENIUS Act Nears Stablecoin Regulation Breakthrough

      July 23, 2025

      Lightchain and Ethereum Spark AI Chain Revolution

      July 23, 2025
    • Gadgets & Smart Tech
      Featured

      Meta Poaches Apple Design Exec Alan Dye to Lead a New Creative Studio

      By preciousDecember 11, 202526
      Recent

      Meta Poaches Apple Design Exec Alan Dye to Lead a New Creative Studio

      December 11, 2025

      Samsung Teases DX Vision and New AI Experiences Ahead of CES 2026

      December 10, 2025

      Why Amazon’s New AI Glasses Are Changing Delivery

      November 10, 2025
    • Cybersecurity & Online Safety

      Cybersecurity Funding Increases as AI-Driven Threats Become More Sophisticated 

      January 12, 2026

      Cisco in Advanced Talks to Acquire Cybersecurity Startup Axonius for $2 billion

      January 7, 2026

      Microsoft Pushes Zero-Trust as the Enterprise Default in 2026 Security Roadmap

      January 3, 2026

      Google Cloud expands Security Services Partnership with Palo Alto Networks in a $10B deal

      December 29, 2025

      Google issues emergency Pixel update after reports of spyware attacks

      December 24, 2025
    PhronewsPhronews
    Home»Cybersecurity & Online Safety»Fortinet’s FortiGuard Cyber-Espionage Findings in the Middle East
    Cybersecurity & Online Safety

    Fortinet’s FortiGuard Cyber-Espionage Findings in the Middle East

    preciousBy preciousMay 31, 2025Updated:June 11, 2025No Comments4 Views
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Image Credit: Just_Super via Getty Images

    Fortinet’s FortiGuard team recently detected and uncovered a highly sophisticated cyber-espionage campaign targeting critical network infrastructure in the Middle East. The investigation, which began in late 2024, revealed that the intrusion had been ongoing for years – from May 2023 to February 2025 – with evidence suggesting that the attackers first gained access as early as May 2021.

    The campaign was attributed to an Iranian state-sponsored group, known in the cybersecurity community as “Lemon Sandstorm.” Their operations focused on espionage and maintaining long-term access to vital systems in critical national infrastructure such as energy, transportation, and telecommunications.

    The attackers initially gained entry using stolen login credentials to access the victim organization’s VPN system. Once inside, they quickly established access by deploying a range of web shells on public-facing servers and installing several custom backdoors. These included malware families like Havoc, HanifNet, HXLibrary, and later NeoExpressRAT. The backdoors were designed to run automatically and allowed the attackers to maintain control over the network even if some of their tools were to be discovered and/or removed.

    According to Fortinet’s report, the campaign unfolded in four different phases. In the first phase, the attackers focused on establishing a solid foothold, which was dated back to May 2023 and lasted until April 2024. “The adversary used stolen credentials to access the victim’s SSL VPN, deploying web shells on public-facing servers and installing Havoc, HanifNet, and HXLibrary backdoors. They then stole credentials and moved laterally using RDP and PsExec,” the company said.

    The threat actors used their access to move laterally across the network, leveraging legitimate tools such as Remote Desktop Protocol (RDP) and PsExec to escalate privileges and reach more sensitive areas. They also created simple web shells with names like “default.aspx” and more advanced, heavily obfuscated ones such as “UpdateChecker.aspx.” As a result, these web shells gave them remote command capabilities and were cleverly disguised to avoid detection.

    As the attackers consolidated their position in what was said to be the second phase (April 2024 – November 2024), they deployed additional web shells and backdoors, including NeoExpressRAT, and began using open-source proxy tools like plink and Ngrok. These tools helped them bypass network segmentation, allowing them to move between otherwise isolated parts of the network. During this phase, they also targeted the victim’s email systems and virtualization infrastructure, exfiltrating sensitive data while remaining hidden.

    When the victim organization began remediation efforts, the attackers responded aggressively. In the third phase that was termed “Initial Remediation and Adversary Response (November 2024 – December 2024),” the victim deployed even more persistence mechanisms, including MeshCentral and SystemBC backdoors, and focused on maintaining access to deeper network segments, particularly those associated with operational technology (OT). Although there was evidence that the attackers reached systems within restricted network segments, there was no conclusive proof that they breached the core OT environment itself.

    The final phase of the intrusion saw the organization implement a comprehensive containment plan by finally removing the attacker’s access. However, the attackers still attempted to regain entry through previously established backdoors, exploiting vulnerable web applications, and launching targeted phishing campaigns to harvest new credentials. 

    According to Fortinet’s report, “The victim successfully removed adversary access. In response, attackers attempted to re-enter via vulnerabilities in web applications and launched targeted phishing campaigns to steal credentials. Multiple failed access attempts were detected.” This persistence highlights the determination and resources available to state-sponsored groups. 

    Throughout the campaign, the attackers used a combination of custom malware and well-known open-source tools. Their methods included lateral movement via RDP and SMB, deployment of web shells for remote command execution, and the use of proxy tools to circumvent network segmentation. They also engaged in targeted credential harvesting through phishing.

    The victim’s network was large and complex, with hundreds of endpoints and a mix of virtualized and dedicated hardware. Despite effective network segmentation and multiple layers of security, the attackers managed to maintain a presence for years by chaining together different proxy tools and persistence mechanisms. Their activity was methodical and patient, which signified a long-term strategy rather than a smash-and-grab approach.

    Fortinet’s findings highlight the evolving tactics of state-sponsored threat actors. Rather than relying on new or highly complex malware, these groups are increasingly using established techniques and legitimate tools to blend in with normal network activity. This makes detection much more difficult and stresses the need for organizations to focus on defending against common attack methods, not just the latest malware variants.

    To defend against such threats, Fortinet recommends organizations monitor for unusual credential use, regularly scan for hidden web shells, restrict the use of common IT tools that can be abused for lateral movement, and adopt behavior-based detection systems. These measures, combined with robust network segmentation and continuous monitoring, can help organizations detect and respond to advanced persistent threats more effectively.

    AdvancedMalware APTDefense APTThreats CredentialHarvesting CriticalInfrastructureAttack CustomBackdoors CyberAttackDetection CyberAttackRemediation CyberDefense CyberEspionage CyberResilience CyberSecurity2025 CybersecurityBestPractices CyberSecurityStrategy CyberSurveillance DigitalEspionage FortiGuard Fortinet FortinetReport InfoSec IranianAPT LateralMovement LemonSandstorm MalwareCampaigns MeshCentral MiddleEastCyberThreats NationStateThreats NeoExpressRAT NetworkMonitoring NetworkSecurity NetworkSegmentation Ngrok OTInfrastructure PersistentThreats PhishingAttacks Plink PsExec RDP RemoteAccessTrojan SecOps SecureInfrastructure SecurityRecommendations SSLVPNBreach StateSponsoredAttack SystemBC ThreatHunting ThreatIntelligence VPNBreach WebShells
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    precious
    • LinkedIn

    I’m Precious Amusat, Phronews’ Content Writer. I conduct in-depth research and write on the latest developments in the tech industry, including trends in big tech, startups, cybersecurity, artificial intelligence and their global impacts. When I’m off the clock, you’ll find me cheering on women’s footy, curled up with a romance novel, or binge-watching crime thrillers.

    Related Posts

    Cybersecurity Funding Increases as AI-Driven Threats Become More Sophisticated 

    January 12, 2026

    Cisco in Advanced Talks to Acquire Cybersecurity Startup Axonius for $2 billion

    January 7, 2026

    Microsoft Pushes Zero-Trust as the Enterprise Default in 2026 Security Roadmap

    January 3, 2026

    Comments are closed.

    Top Posts

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025131

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 202587

    Coinbase Hack 2025: Everything we know so far.

    May 21, 202583

    Coinbase responds to hack: customer impact and official statement

    May 22, 202579
    Don't Miss
    Artificial Intelligence & The Future

    Google TPU Chips Threatens Nvidia’s GPU Dominance

    By preciousJanuary 13, 20263

    Google’s Tensor Processing Units (TPUs) pose a growing challenge to Nvidia’s dominance in AI hardware…

    Cybersecurity Funding Increases as AI-Driven Threats Become More Sophisticated 

    January 12, 2026

    Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

    January 10, 2026

    Nvidia in Talks to Acquire AI21 Labs in $3B Generative AI Deal

    January 8, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025131

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 202587

    Coinbase Hack 2025: Everything we know so far.

    May 21, 202583
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.