A threat group linked to the Iranian Revolutionary Guard Corps (IGRC) has been discovered staging political messaging and fake job offerings to deceive employees and compromise systems at aerospace and defense firms across the Middle East. The campaign, identified by Google Cloud’s Mandiant, is believed to be associated with the Iranian threat group UNC1549, also known as Smoke Sandstorm and Tortoiseshell. This group employs spear phishing and watering-hole attacks to harvest credentials and deploy malware, ultimately installing backdoor software such as MINIBIKE or its newer version, MINIBUS, on targeted systems.
According to Jonathan Leathery, principal analyst for Google Cloud’s Mandiant, this attack is particularly challenging to detect due to its tailored spear phishing tactics and use of cloud infrastructure for command-and-control. The sophisticated nature of the threat suggests that the group has significant resources at their disposal and is selective in their targeting. Leathery warns that there may be additional unidentified activities by this threat actor, and their post-compromise operations remain largely unknown.
Iranian threat groups have increasingly set their sights on critical industries to extract government secrets and intellectual property. In 2021, Microsoft observed a notable shift as Iran-linked cyber operations targeted IT services firms as a gateway to infiltrate government networks. The number of intrusion alerts issued to IT services firms by Microsoft skyrocketed from 48 in 2020 to 1,647 in 2021, reflecting a surge in Iranian cyber activity.
The UNC1549 group, identified by Google, formerly focused on IT service providers but has expanded its tactics to include watering-hole attacks and spear phishing. As of February 2024, the group has shifted its attention to aerospace, aviation, and defense companies in Israel and the UAE, potentially extending its reach to Albania, India, and Turkey. Google’s analysis suggests that the intelligence gathered by this group aligns with strategic Iranian interests and could be utilized for espionage or kinetic operations.
The attack chain initiated by UNC1549 typically begins with tailored spear phishing emails containing links to fake job sites or pro-Israeli hostage movements. These emails eventually lead victims to download either MINIBIKE or MINIBUS backdoors, enabling data exfiltration, command execution, and reconnaissance capabilities. UNC1549 exhibits meticulous preparatory work, including registering domain names relevant to their targets and crafting custom content for each victim, making the total number of impacted organizations challenging to estimate.
Google Cloud’s Mandiant assigns a “medium” confidence level to the attribution of these activities to UNC1549, indicating a high likelihood of their involvement but not ruling out the possibility of other actors working in support of the Iranian government. To mitigate the risk posed by these cyber threats, organizations are advised to block untrusted email links and provide comprehensive awareness training to educate employees about evolving phishing techniques.
The technical analysis conducted by Google outlines specific indicators of compromise for MINIBIKE and MINIBUS malware, including Azure domains used for command and control, persistence mechanisms through OneDrive registry keys, and beacon communications patterns mimicking web components. The newer MINIBUS variant demonstrates increased compactness and flexibility, adapting to evade detection on virtual machines and bypass security applications.
In conclusion, the evolving tactics and sophisticated operations of Iranian threat groups underscore the importance of robust cybersecurity measures and ongoing vigilance within targeted industries. By staying informed, implementing effective security controls, and fostering a culture of cyber awareness, organizations can enhance their resilience against advanced threat actors like UNC1549.

