Threats Feed|Mango Sandstorm (Mercury)|Last Updated 24/01/2025|AuthorCertfa Radar|Publish Date06/10/2020

Iranian APT MERCURY Exploits Zerologon in Persistent Cyber Campaigns

  • Actor Motivations: Espionage,Exfiltration
  • Attack Vectors: Vulnerability Exploitation
  • Attack Complexity: Very High
  • Threat Risk: High Impact/Low Probability

Threat Overview

Microsoft reports that the Iranian APT group MERCURY (aka MuddyWater) is actively exploiting the Zerologon vulnerability (CVE-2020-1472) to compromise Active Directory services. Known for targeting Middle Eastern governments for data exfiltration, MERCURY has also exploited the SharePoint vulnerability (CVE-2019-0604) to implant web shells for persistent access. These attacks often involve Cobalt Strike payloads and lateral movement within networks, focusing on domain controllers. Despite patches released in 2020, exploitation attempts remain widespread, highlighting the need for robust patch management. MERCURY's activities highlight the ongoing threat to governments and other critical sectors in the Middle East.

Detected Targets

TypeDescriptionConfidence
RegionMiddle East Countries
High