Iranian-Nexus Hackers Hit Oman Ministries and Expose 26,000 Citizen Records


An Iranian-nexus cyber operation targeted Oman’s government ministries and exposed more than 26,000 citizen records, according to new threat research from Hunt.io. The campaign focused on government portals, judicial data, identity records, credentials, and internal systems used by public institutions.

The attackers used webshells, SQL escalation scripts, Exchange exploitation attempts, password spraying, and command-and-control infrastructure to move through the environment. The primary confirmed victim was Oman’s Ministry of Justice and Legal Affairs, where logs showed active operator activity on April 10, 2026.

The campaign came to light because the attackers left a staging server exposed. Hunt.io found an open directory on a UAE-hosted RouterHosting VPS at 172.86.76[.]127, which revealed the toolkit, C2 scripts, session logs, stolen data, and targeting files.

What researchers found

The exposed server gave researchers a rare look at an active government intrusion. It contained 211 files, 17 directories, command scripts, exploit folders, PowerShell tooling, and a README file that described the system as “VPS C2.”

That label suggests the machine may have been one node in a larger setup. The files also showed a structured working environment rather than a loose collection of tools, which means the operators had organized the campaign across separate functions.

Snippet of the C2 logs showing 26,596 MJLA user records extracted from the compromised system (Source – Hunt.io)

The campaign did not only target one ministry. Hunt.io said file names and attack scripts mapped to 12 Omani government entities, including the Ministry of Justice and Legal Affairs, Royal Oman Police, Tax Authority, Ministry of Finance, Civil Aviation Authority, and Office of Public Prosecution.

Key detailWhat was found
Main confirmed victimOman Ministry of Justice and Legal Affairs
Government entities targeted12 ministries and public bodies
Records extracted26,596 Ministry of Justice user records
Exposed infrastructureUAE-hosted RouterHosting VPS at 172.86.76[.]127
Confirmed operator activityApril 10, 2026, starting around 03:00 UTC
Attribution statusIranian state-nexus activity, without formal group-level attribution

Webshells gave attackers command access

Two webshells played a central role in the operation. One file, hc2.aspx, appeared on the exposed C2 server. Another webshell, health_check_t.aspx, appeared hardcoded across attack scripts that targeted the Ministry of Justice environment.

The webshells let the attackers pass commands to Windows command processes and receive output as plain text. In practice, this gave the operators a way to run discovery commands, check host details, query databases, and continue working inside the compromised network.

Hunt.io also found scripts that pointed to a possible DotNetNuke attack path. CVE-2025-32372 affects DNN, formerly DotNetNuke, and can allow semi-blind server-side request forgery against vulnerable systems. The flaw was fixed in DNN 9.13.8.

What data was stolen

The stolen data appears especially sensitive because it involved government, identity, and judicial systems. Hunt.io said the attackers extracted Ministry of Justice user records, judicial case data, committee decisions, expert certification data, and Windows registry hives.

The database activity showed a clear interest in user accounts and identity information. The attackers queried DotNetNuke membership tables, looked for superuser accounts, and tried to collect stored credentials that could help them expand access.

Some queries also targeted personal data, including national ID numbers, full names in Arabic and English, dates of birth, and nationality records. This kind of data can support espionage, identity abuse, phishing, and long-term targeting of government employees or citizens.

  • Ministry user records
  • Judicial case data
  • Committee decision files
  • Expert certification information
  • National identity records
  • Windows SAM and SYSTEM registry hives
  • Internal credentials and account data

The campaign reached beyond one agency

The exposed files showed targeting across a wide part of Oman’s public sector. The Royal Oman Police eVisa portal appeared in brute-force activity, while Royal Fleet of Oman and Tax Authority mail servers appeared in ProxyShell-related scripts.

The Office of Public Prosecution was linked to SQL injection and database extraction activity. The Ministry of Finance appeared in scripts linked to Spring Boot Actuator exposure, while other portals were tied to enumeration, authentication probing, and application-level attacks.

Researchers also found a dedicated gov[.]om folder with 12 exploit scripts. These covered Exchange spraying, SQL Server escalation, memory-based execution, Oracle APEX and ORDS attacks, WAF bypass attempts, Fortinet checks, Joomla targeting, and national ID access weaknesses.

Command-and-control setup and persistence

The C2 system used Python HTTP server code and a PowerShell beacon on the victim side. The beacon checked in every 30 seconds and sent the victim domain, username, and hostname at the beginning of each session.

Stolen data moved back in small encoded chunks. This helped the attackers avoid simple URL length limits while still sending data through command-and-control traffic.

The operators also attempted persistence with a scheduled task named MicrosoftEdgeUpdate. Microsoft Defender blocked that attempt, but another script on the exposed server showed an effort to disable antivirus protection.

Why researchers connect it to Iranian-nexus activity

Hunt.io placed the campaign in the broader Iranian state-nexus space, but it did not assign the activity to a specific group. The reason is important: strong attribution needs unique malware, shared infrastructure, or other firm technical links.

The operation still overlaps with known Iranian-nexus patterns. Hunt.io noted similarities with APT34, also known as OilRig, and MuddyWater, also known as Mango Sandstorm. Those overlaps include regional government targeting, PowerShell-heavy tooling, Chisel use, ProxyShell-related activity, and credential-focused operations.

The surrounding infrastructure also added context. Neighboring systems in the same hosting cluster included domains tied to Iranian-language content, censorship circumvention themes, and other services. Hunt.io treated these as useful context, not final proof of one specific group.

Why this matters for government security

This incident shows how old vulnerabilities and weak portal security can still support serious intrusions. ProxyShell dates back to 2021, yet the files suggest attackers still test Exchange servers for exposure when hunting government networks.

The campaign also shows why exposed attacker infrastructure matters. A single open directory revealed how the operators worked, which organizations they targeted, which files they collected, and how they moved data out of the victim environment.

For defenders, the main lesson is direct. Government agencies need to monitor internet-facing servers, patch old public-facing systems, review webshell indicators, audit identity portals, and watch for unusual PowerShell and SQL Server behavior.

Indicators highlighted by researchers

IndicatorAssociated domain or noteHosting
172.86.76[.]127dubai-10.vaermb[.]comRouterHosting LLC, UAE
172.86.76[.]101dubai-1.vaermb[.]com, regorixa[.]comRouterHosting LLC, UAE
172.86.76[.]108dubai-3.vaermb[.]com, myjitsi.exceptionnotfound[.]irRouterHosting LLC, UAE
172.86.76[.]124suanefllix[.]com, brnettlix[.]com, realprimefix[.]comRouterHosting LLC, UAE
45.59.114[.]60shop.exceptionnotfound[.]ir, myjitsi.mrnajafipour[.]irRouterHosting LLC, Switzerland
104.21.27[.]95 and 172.67.142[.]35tools.exceptionnotfound[.]irCloudflare

FAQ

Who was targeted in the Oman cyberattack?

The primary confirmed victim was Oman’s Ministry of Justice and Legal Affairs. Hunt.io also found files that mapped to 12 Omani government ministries and public bodies.

How many records were exposed?

Researchers found evidence that 26,596 Ministry of Justice user records were extracted from the compromised environment.

What tools did the attackers use?

The attackers used webshells, PowerShell beaconing, SQL Server escalation, ProxyShell-related scripts, credential attacks, and post-compromise tooling such as GodPotato.

Was one Iranian hacking group named?

No. Hunt.io connected the activity to the broader Iranian state-nexus space, but it did not make a formal group-level attribution.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages