Nimbus Manticore Deploys New Malware Targeting Europe
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
The Iranian threat actor Nimbus Manticore has expanded its operations, targeting defense, telecommunications, and aviation sectors in Western Europe. The group uses sophisticated spear-phishing techniques, impersonating HR recruiters to lure victims to fake career portals. Their toolset includes the MiniJunk backdoor and MiniBrowse stealer, which have evolved to employ advanced evasion techniques like multi-stage DLL sideloading, heavy obfuscation, and code signing. The malware infrastructure leverages Azure App Services for resilient command and control. Nimbus Manticore's recent activities demonstrate increased focus on stealth, operational security, and expanding their targeting to align with Iranian strategic priorities.
OPENCTI LABELS :
apt,spear-phishing,obfuscation,dll sideloading,telecommunications
AI COMMENTARY :
1. Introduction: Nimbus Manticore Deploys New Malware Targeting Europe Nimbus Manticore, an Iranian-aligned advanced persistent threat actor, has recently intensified its cyber espionage activities across Western Europe. By focusing on defense, telecommunications, and aviation sectors, the group is seeking to gather valuable intelligence and disrupt critical infrastructure. This blog delves into Nimbus Manticore’s latest campaign, examining the spear-phishing tactics, malware toolset, and evasion techniques that define their operations.
2. Threat Actor Profile Nimbus Manticore has established itself as a persistent adversary in the threat intelligence community. Known for its patience and precision, the group aligns its operations with strategic Iranian objectives. Their APT designation underscores a level of sophistication that combines technical skill with deep reconnaissance, enabling them to target high-value organizations and extract sensitive data without detection.
3. Target Sectors and Strategic Focus The latest campaign targets Western Europe’s defense contractors, major telecommunications providers, and aviation companies. These sectors hold critical strategic importance, as defense firms develop cutting-edge military technologies, telecom operators manage national communications networks, and aviation businesses handle geopolitical logistics. By infiltrating these organizations, Nimbus Manticore can gain insight into defense capabilities, intercept communications, and influence supply chains.
4. Spear-Phishing and Social Engineering At the core of Nimbus Manticore’s approach lies sophisticated spear-phishing. The group impersonates HR recruiters from reputable firms to contact potential victims, luring them to counterfeit career portals. These fake sites replicate real corporate branding and require users to upload résumés or fill out personal details. Once victims engage, they inadvertently download the MiniJunk backdoor or MiniBrowse stealer, granting the attackers a foothold in their systems.
5. MiniJunk Backdoor and MiniBrowse Stealer Nimbus Manticore’s primary malware components have evolved significantly. MiniJunk functions as a covert backdoor, enabling long-term access and data exfiltration. MiniBrowse specializes in harvesting browser-stored credentials, session cookies, and other sensitive artifacts. Both tools now incorporate advanced modules that adapt to changing target environments and support modular upgrades without detection.
6. Advanced Evasion Techniques To avoid security defenses, Nimbus Manticore uses multi-stage DLL sideloading. This technique involves substituting legitimate application DLLs with malicious versions, allowing code execution under the guise of trusted processes. Heavy obfuscation further complicates analysis by encrypting strings, jumbling control flow, and embedding dead code. Code signing certificates, some obtained through illicit channels, lend the malware an appearance of legitimacy, bypassing many endpoint protections.
7. Resilient Command and Control via Azure App Services The group leverages cloud infrastructure to host resilient command and control servers. By deploying C2 endpoints on Azure App Services, Nimbus Manticore benefits from high availability, encrypted communication channels, and the ability to scale operations on demand. These cloud-based assets blend with legitimate traffic, making them difficult to blacklist or disrupt without affecting benign services.
8. Implications for European Organizations Nimbus Manticore’s renewed focus on Western Europe underscores a growing cyber threat to critical industries. Organizations must assume they are under constant observation and implement a zero-trust approach to user credentials and remote communications. Enhanced email filtering, rigorous certificate validation, and strict application whitelisting can mitigate spear-phishing and sideloading attacks. Continuous threat hunting and network segmentation will also reduce the risk of widespread compromise.
9. Conclusion and Recommendations The deployment of MiniJunk, MiniBrowse, spear-phishing stratagems, and sophisticated evasion techniques by Nimbus Manticore signals an escalating threat to Europe’s security and economic stability. To defend against this APT, organizations should prioritize threat intelligence sharing, regular security audits, and ongoing staff training on social engineering. By adopting a proactive security posture, companies can detect anomalous behavior early and safeguard their critical assets against future incursions.
OPEN NETMANAGEIT OPENCTI REPORT LINK!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Nimbus Manticore Deploys New Malware Targeting Europe