Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

Source: The Hacker News
Published: 2025-05-13 05:08
Fetched: 2025-05-13 07:24

Summary

A Türkiye-affiliated cyber threat group has been exploiting a zero-day vulnerability in Output Messenger, an Indian enterprise communication platform. This campaign, active since April 2024, has primarily targeted Kurdish entities in Iraq. The attackers deployed Golang-based backdoors to facilitate cyber espionage, collecting sensitive user data from compromised systems. Microsoft Threat Intelligence has highlighted the sophisticated nature of this operation, emphasizing the importance of securing communication platforms against such vulnerabilities. The incident underscores the growing trend of nation-state actors leveraging zero-day exploits for geopolitical gains.

LinkedIn Post

Türkiye hackers exploited a zero-day in Output Messenger to deploy Golang backdoors on Kurdish servers, highlighting the critical need for robust cybersecurity measures. Stay vigilant and protect your communication platforms. #CyberSecurity #ZeroDay #Golang #ThreatIntelligence

Content

A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform called Output Messenger as part of a cyber espionage attack campaign since April 2024. "These exploits have resulted in a collection of related user data from targets in Iraq," the Microsoft Threat Intelligence team said. "The targets of the attack are associated with the Kurdish