Seedworm APT Abuses Signed Fortemedia and SentinelOne Binaries for DLL Sideloading

Iran-linked hackers have been quietly breaking into networks around the world, and their latest campaign is more calculated than anything we have seen from them before.

The group known as Seedworm, also tracked as MuddyWater, spent the first quarter of 2026 targeting at least nine organizations across nine countries on four continents, leaving a trail of stolen data and compromised credentials.

The targets ranged widely, touching industrial and electronics manufacturing firms, educational institutions, government agencies, financial services providers, and even an international airport in the Middle East.

One of the most striking intrusions took place in February 2026, when the group spent a full week inside the network of a major South Korean electronics manufacturer, a region far outside its traditional hunting ground.

Analysts from Symantec’s Threat Hunter Team identified the campaign and linked it to Seedworm, a group widely believed to operate on behalf of Iran’s Ministry of Intelligence and Security.

The researchers noted that every targeted organization likely held information of direct intelligence value to Tehran, whether that was intellectual property, government data, or access to downstream customers.

Abusing Signed Binaries for DLL Sideloading

What stands out is not just the range of victims, but how the attackers moved through their targets. Rather than relying on noisy, easily detected methods, Seedworm showed a level of operational discipline that signals real maturity in its tradecraft. The attackers blended their techniques to stay hidden, move quietly, and extract data without triggering obvious alarms.

The group also updated its tooling, mixing familiar tools with new delivery methods and choosing exfiltration paths that are harder to detect. This campaign is a clear reminder that state-linked espionage actors are constantly refining their approach, and defenders need to stay ahead.

The most striking technique in this campaign was how the attackers turned trusted software against the organizations it was supposed to protect. They dropped pairs of files on targeted systems: one legitimate, signed executable, and one malicious DLL crafted to be secretly loaded by it.

The first pair used fmapp.exe, a legitimate audio-driver utility, to load a malicious file called fmapp.dll. The second pair was more provocative: sentinelmemoryscanner.exe, a legitimate component from a well-known security product, was used to sideload a malicious file called sentinelagentcore.dll. By sheltering behind trusted, signed software, the attackers made their activity look benign at a glance, defeating both path-based and signature-based detection.

Both malicious DLLs carried ChromElevator, a post-exploitation tool capable of stealing passwords, cookies, and payment card data from Chromium-based browsers. In every observed case, the parent process launching these files was node.exe, meaning a Node.js script was driving the entire sideloading chain rather than a human operator at a keyboard.

Credential Theft, Exfiltration, and Defensive Steps

Once inside a network, the attackers wasted no time collecting credentials and locking in their access. They used registry changes to ensure their loader chain would restart every time the affected user logged in. They also dumped Windows registry hives containing password hashes, giving them offline material for cracking and lateral movement.

Multiple credential-theft tools were deployed in rapid succession, showing the attackers wanted redundancy in case any single method was caught. One tool triggered a fake Windows login prompt to harvest a password and saved it to a plaintext file on disk. Another automated Kerberos ticket extraction without ever needing a domain administrator’s password.

For exfiltration, the group used sendit[.]sh, a public file-transfer service, to move stolen files off the network. Routing data through a consumer cloud platform is a deliberate tactic to blend malicious traffic with ordinary internet activity. Organizations should monitor for unexpected use of public file-sharing services and audit all outbound transfers from sensitive directories.

Defenders should also watch for unusual node.exe process trees, unexpected DLL loads from signed third-party binaries, and PowerShell pulling content from external staging servers. Keeping endpoint detection rules current and reviewing registry run keys regularly can reduce the window attackers have to maintain their foothold.

Indicators of Compromise (IoCs):-

TypeIndicatorDescription
SHA256e25892603c42e34bd7ba0d8ea73be600d898cadc290e3417a82c04d6281b743bfmapp.exe (legitimate sideloading binary)
SHA256c6182fd01b14d84723e3c9d11bc0e16b34de6607ccb8334fc9bb97c1b44f0cdefmapp.dll (malicious sideloaded DLL)
SHA256128b58a2a2f1df66c474094aacb7e50189025fbf45d7cd8e0834e93a8fbed667sentinelmemoryscanner.exe (legitimate sideloading binary)
SHA2560c9b911935a3705b0ad569446804d80026feb6db3884aeb240b6c76e9b8cf139sentinelagentcore.dll (malicious sideloaded DLL)
SHA25674ab3838ebed7054b2254bf7d334c80c8b2cfec4a97d1706723f8ea55f11061fPrivilege escalation tool
SHA2563ee7dab4ae4f6d4f16dfabb6f38faef370411a9fc00ff035844e54703b99600aSAM hive credential extractor
SHA256bee79c3302b1a7afc0952842d14eff83a604ef00bfdae525176c16c80b2045f7SAM hive credential extractor
SHA256d587959841a763669279ad831b8f0379f6a7b037dffc19deab5d41f37f8b5ffcCredential harvester
SHA256b21c802775df0c0d82c8cfde299084abc624898b10258db641b820172a0ba29aSOCKS5 proxy tool
IP Address179.43.177[.]220Attacker-controlled staging server
IP Address178.128.233[.]36Network IOC
IP Address172.67.156[.]47Network IOC
IP Address104.21.48[.]205Network IOC
IP Address37.187.78[.]41Network IOC
IP Address34.117.59[.]81Network IOC
Domaintimetrakr[.]cloudAttacker-owned staging domain
Domainsendit[.]shPublic file-transfer service used for exfiltration
Domainsvc.wompworthy[.]comNetwork IOC
URLhttp://179.43.177[.]220:8080/nm.ps1PowerShell payload download URL
URLhttp://179.43.177[.]220:8080/a.datEncoded payload download URL
URLhttp://179.43.177[.]220:8080/a.exeBinary download URL
URLhttp://ipinfo[.]io/jsonUsed to identify host’s public IP
URLhttps://svc.wompworthy[.]comNetwork IOC

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Seedworm APT Abuses Signed Fortemedia and SentinelOne Binaries for DLL Sideloading appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading