Iran-Linked Seedworm Hackers Abuse Signed Fortemedia and SentinelOne Binaries in Espionage Campaign


Iran-linked Seedworm hackers have been tied to a new cyber-espionage campaign that abused signed Fortemedia and SentinelOne binaries to sideload malicious DLL files on victim systems.

The campaign targeted at least nine organizations across nine countries and four continents during the first quarter of 2026. Victims included a major South Korean electronics manufacturer, government agencies, industrial manufacturers, financial services firms, educational institutions, and an international airport in the Middle East.

Symantec’s Threat Hunter Team linked the activity to Seedworm, also tracked as MuddyWater, Static Kitten, Temp Zagros, and Mango Sandstorm. The group is widely associated with Iran’s Ministry of Intelligence and Security and has a long history of cyber-espionage operations.

What happened in the Seedworm campaign

The most notable intrusion involved a major South Korean electronics manufacturer. Researchers said Seedworm remained inside the company’s network for about a week in February 2026, between February 20 and February 27.

The attackers appeared focused on intelligence collection, credential theft, and network access rather than quick disruption. Their targets suggest an interest in intellectual property, government information, sensitive business data, and possible downstream access to customers or partners.

The campaign also showed a more disciplined approach than older Seedworm activity. The group used legitimate tools, signed binaries, Node.js-based loaders, PowerShell scripts, public file-transfer services, and multiple credential theft methods to reduce detection opportunities.

How the DLL sideloading worked

Seedworm used DLL sideloading, a technique where attackers place a malicious DLL next to a legitimate executable that loads it automatically or through an unsafe search path.

In this campaign, the attackers used fmapp.exe, a legitimate Fortemedia audio-driver utility, to load a malicious DLL named fmapp.dll. They also used sentinelmemoryscanner.exe, a legitimate SentinelOne component, to load a malicious DLL named sentinelagentcore.dll.

This does not mean Fortemedia or SentinelOne were compromised. The attackers abused trusted, signed software to make malicious execution look less suspicious during endpoint review.

TechniqueLegitimate file abusedMalicious file loadedPurpose
DLL sideloadingfmapp.exefmapp.dllLoad malicious code through a trusted Fortemedia utility
DLL sideloadingsentinelmemoryscanner.exesentinelagentcore.dllLoad malicious code through a trusted SentinelOne component

ChromElevator used for browser data theft

The malicious DLL files carried ChromElevator, a post-exploitation tool designed to steal data from Chromium-based browsers.

That can include saved passwords, cookies, browsing data, and payment card details stored in browser profiles. Browser theft can help attackers bypass normal login barriers if stolen cookies still allow access to corporate applications.

Researchers also found that node.exe launched the sideloading chains in observed cases. This suggests automated Node.js-based tooling drove parts of the operation, rather than a hands-on operator manually launching every step.

Seedworm used PowerShell, registry changes, and credential tools

After gaining access, Seedworm used PowerShell for reconnaissance, screenshots, payload downloads, persistence, credential theft, and SOCKS5 proxy tunneling.

The group also made registry changes to keep its loader chain running after user login. This gave the attackers a way to maintain access even after a restart or user session change.

Credential theft played a central role in the campaign. The attackers dumped Windows registry hives, used fake Windows login prompts, and deployed tools that could extract Kerberos tickets without requiring a domain administrator password.

  • Host and domain reconnaissance helped Seedworm map the victim environment.
  • WMI checks helped the attackers identify security products.
  • Screenshot capture gave visibility into user activity and system state.
  • Registry hive theft provided material for offline password cracking.
  • Fake login prompts helped collect plaintext credentials.
  • SOCKS5 proxy tooling supported stealthy network access.

Data was moved through a public file-transfer service

Seedworm used sendit.sh, a public file-transfer service, to exfiltrate stolen data. This choice can help malicious transfers blend into normal outbound web traffic.

Public file-sharing services create a challenge for defenders because they often appear in legitimate business workflows. Blocking them outright may disrupt users, but ignoring them gives attackers an easy exfiltration path.

Security teams should monitor unexpected uploads to consumer file-transfer platforms, especially from sensitive systems, administrator workstations, development machines, and servers with access to confidential data.

Key indicators of compromise

Defenders can use the following indicators as hunting leads. They should not rely only on hashes and IP addresses, since attackers can change infrastructure quickly.

TypeIndicatorDescription
SHA-256e25892603c42e34bd7ba0d8ea73be600d898cadc290e3417a82c04d6281b743bfmapp.exe legitimate sideloading binary
SHA-256c6182fd01b14d84723e3c9d11bc0e16b34de6607ccb8334fc9bb97c1b44f0cdefmapp.dll malicious sideloaded DLL
SHA-256128b58a2a2f1df66c474094aacb7e50189025fbf45d7cd8e0834e93a8fbed667sentinelmemoryscanner.exe legitimate sideloading binary
SHA-2560c9b911935a3705b0ad569446804d80026feb6db3884aeb240b6c76e9b8cf139sentinelagentcore.dll malicious sideloaded DLL
IP address179.43.177[.]220Attacker-controlled staging server
Domaintimetrakr[.]cloudAttacker-owned staging domain
Domainsendit[.]shPublic file-transfer service used for exfiltration
URLhttp://179.43.177[.]220:8080/nm.ps1PowerShell payload download URL

Why this matters for defenders

The campaign shows how state-linked actors can use legitimate software to hide malicious activity. Signed binaries often receive more trust from users, security tools, and incident responders.

DLL sideloading also makes detection harder because the visible process may appear legitimate. The real payload may sit in the DLL loaded by that trusted executable.

Organizations should treat unusual combinations of signed executables and unexpected DLL files as suspicious, especially when they appear in temporary directories, user-writable folders, staging paths, or locations unrelated to the original vendor software.

What security teams should check

Security teams should review endpoint telemetry for unusual node.exe process trees, PowerShell downloads from external servers, and signed binaries loading DLL files from suspicious locations.

They should also review registry run keys, scheduled tasks, browser credential access, file-transfer activity, and outbound connections to known infrastructure from the campaign.

Because Seedworm used several credential theft methods, responders should assume that affected hosts may expose both browser credentials and Windows authentication material.

  1. Search for fmapp.exe loading fmapp.dll from unexpected paths.
  2. Search for sentinelmemoryscanner.exe loading sentinelagentcore.dll outside normal product directories.
  3. Review node.exe processes that launch signed third-party binaries or PowerShell.
  4. Check PowerShell logs for downloads from external IP addresses or unknown domains.
  5. Audit registry run keys for suspicious persistence entries.
  6. Review outbound transfers to public file-sharing platforms.
  7. Rotate credentials from systems where browser or registry hive theft is suspected.
  8. Review Kerberos activity for unusual ticket extraction or lateral movement patterns.

Seedworm’s campaign shows a quieter espionage model

Seedworm has used noisy and visible techniques in past campaigns, but this activity shows a more careful operating style.

The group combined trusted binary abuse, automated loaders, credential theft, persistence, proxy tooling, and public file-transfer services into a practical espionage workflow.

For defenders, the main lesson is that signed software alone does not prove safe behavior. Security teams need to monitor how trusted binaries run, what DLLs they load, where those files reside, and which parent processes launched them.

FAQ

What is Seedworm?

Seedworm is an Iran-linked cyber-espionage group also tracked as MuddyWater, Static Kitten, Temp Zagros, and Mango Sandstorm. It has targeted government and private-sector organizations in multiple regions since at least 2017.

What did Seedworm do in this campaign?

Seedworm targeted at least nine organizations across nine countries and four continents. The group abused signed Fortemedia and SentinelOne binaries for DLL sideloading, stole credentials, used PowerShell, and exfiltrated data through a public file-transfer service.

Were Fortemedia or SentinelOne breached?

The available reporting does not show that Fortemedia or SentinelOne were breached. The attackers abused legitimate signed binaries from those vendors to load malicious DLL files through sideloading.

What is DLL sideloading?

DLL sideloading is an attack technique where a legitimate executable loads a malicious DLL file. Attackers often use it to make malicious activity appear as if it came from trusted software.

What should organizations monitor after this Seedworm campaign?

Organizations should monitor unusual node.exe process trees, PowerShell downloads, signed binaries loading unexpected DLLs, registry persistence, browser credential access, public file-transfer uploads, and outbound traffic to known Seedworm infrastructure.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages