ATLA WIRE

Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks

19.11.2025
17106
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
UNC1549 uses phishing, third-party breaches, and custom backdoors to infiltrate aerospace, telecom, and defense networks.

🚨 Iranian Hackers Deploy DEEPROOT & TWOSTROKE Malware in High-Stakes Attacks

UNC1549 — an Iranian threat actor — is going hard on aerospace, telecom, and defense sectors using phishing, third-party breaches, and custom backdoors. They're not playing around.
Their toolkit includes DEEPROOT and TWOSTROKE malware — custom-built backdoors designed to slip past defenses and maintain persistent access. This isn't your average script-kiddie stuff; it's state-level espionage with serious tradecraft.
The group leverages compromised third-party vendors and supply chain weak points to get inside target networks. Once in, they move laterally, exfiltrating sensitive data and establishing long-term footholds.
  • Actor: UNC1549 (Iran-linked)
  • Targets: Aerospace, Telecom, Defense
  • Techniques: Phishing, Third-party breaches, Custom backdoors
  • Malware: DEEPROOT, TWOSTROKE
  • Objective: Cyber espionage, data theft, persistent access
Security teams are urged to lock down third-party access, monitor for unusual lateral movement, and deploy endpoint detection that can spot these custom tools. This is a clear reminder: your supply chain is your attack surface.
#supply chain attacks#backdoors#malware#cyber espionage#phishing
Got a topic? Write to ATLA WIRE on Telegram:t.me/atla_community
Banner | ATLA WIRE