<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>OnlyOffice — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/onlyoffice/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 22 May 2026 15:18:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/onlyoffice/feed.xml" rel="self" type="application/rss+xml"/><item><title>Nimbus Manticore Resurfaces During Operation Epic Fury with New Techniques</title><link>https://feed.craftedsignal.io/briefs/2026-05-nimbus-manticore/</link><pubDate>Fri, 22 May 2026 15:18:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nimbus-manticore/</guid><description>Nimbus Manticore, an Iranian IRGC-affiliated threat actor, resurfaced during Operation Epic Fury, employing AppDomain Hijacking, SEO poisoning, and a new MiniFast backdoor while targeting the aviation and software sectors.</description><content:encoded><![CDATA[<p>Nimbus Manticore (UNC1549), an Iranian IRGC-affiliated threat actor, resurfaced during Operation Epic Fury in February 2026, targeting the defense, aviation, and telecommunication sectors. The actor employed new techniques, including AppDomain Hijacking, AI-assisted malware development for its MiniFast backdoor, and SEO poisoning, demonstrating enhanced capabilities. The campaign used phishing lures impersonating organizations in the aviation and software sectors across the United States, Europe, and the Middle East. The actor also abused a Zoom installer&rsquo;s execution flow to stage a time-sensitive infection chain, blending malicious activity with legitimate system processes. This resurgence indicates the actor&rsquo;s rapid adaptation and operational availability during periods of geopolitical tension.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Spear-phishing emails are sent to employees in the aviation and software sectors with fake career opportunities.</li>
<li><strong>Lure Delivery:</strong> Victims are directed to download a ZIP archive hosted on platforms like OnlyOffice.</li>
<li><strong>AppDomain Hijacking:</strong> The ZIP file contains a benign <code>Setup.exe</code>, a malicious <code>Setup.exe.config</code> file that hijacks the application domain, <code>uevmonitor.dll</code> (first-stage dropper), and a benign <code>Interop.TaskScheduler.dll</code>.</li>
<li><strong>First Stage Execution:</strong> Executing <code>Setup.exe</code> loads <code>uevmonitor.dll</code>, which extracts and deploys the next-stage payload.</li>
<li><strong>MiniJunk Deployment:</strong> The dropper writes files into <code>C:\Users\&lt;USER&gt;\AppData\Local\Packages\</code>, including a legitimate executable for DLL sideloading and a malicious DLL identified as a new version of the MiniJunk backdoor.</li>
<li><strong>Zoom Installer Abuse:</strong> A malicious DLL is sideloaded into a legitimate Zoom installer to execute code.</li>
<li><strong>MiniFast Backdoor Installation:</strong> The new MiniFast backdoor is installed, providing remote access and control.</li>
<li><strong>Persistence and Data Exfiltration:</strong> The MiniFast backdoor establishes persistence and begins exfiltrating data from the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Nimbus Manticore campaign targeted organizations in the aviation and software sectors across the United States, Europe, and the Middle East. Successful exploitation leads to the installation of the MiniFast backdoor, enabling data exfiltration and potential disruption of operations. This can compromise sensitive information, intellectual property, and critical infrastructure within the targeted sectors. The actor&rsquo;s enhanced capabilities, including AI-assisted malware development, allow for rapid adaptation and increased operational effectiveness during periods of conflict.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>Setup.exe</code> loading DLLs from unusual locations, specifically <code>uevmonitor.dll</code>, to detect AppDomain Hijacking (see Sigma rule <code>Detect AppDomain Hijacking via Setup.exe</code>).</li>
<li>Implement network monitoring for connections to known malicious domains associated with Nimbus Manticore, such as those listed in the referenced Checkpoint report.</li>
<li>Enable Sysmon logging for process creation and file creation events to capture the full attack chain, including the execution of <code>Setup.exe</code> and the creation of files in the <code>C:\Users\&lt;USER&gt;\AppData\Local\Packages\</code> directory.</li>
<li>Deploy the Sigma rule <code>Detect MiniJunk File Creation</code> to identify files written to the user&rsquo;s AppData\Local\Packages directory, which is indicative of MiniJunk deployment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>nimbus-manticore</category><category>irgc</category><category>appdomain-hijacking</category><category>seo-poisoning</category><category>minijunk</category><category>minifast</category><category>infostealer</category></item></channel></rss>