Nimbus Manticore Shows Iranian APTs Are Moving Faster With AI-Assisted Tooling

Editorial cybersecurity illustration of Iranian Nimbus Manticore APT tooling, fake installers, SEO poisoning, and backdoor command-and-control. Featured image for Bulwark Black analysis of Nimbus Manticore MiniFast activity.

Iran-nexus intrusion activity is not just louder during geopolitical conflict; it is getting faster and more adaptive. Check Point Research reports that IRGC-affiliated Nimbus Manticore, also tracked as UNC1549, resurfaced during the 2026 Iran conflict with updated delivery methods, new malware, and signs of AI-assisted development.

For small businesses and government contractors, the important lesson is practical: the initial access path did not require exotic zero-days. The campaign relied on trusted-looking software flows, career and meeting lures, signed components, search-engine manipulation, and normal Windows persistence mechanisms that can blend into everyday activity.

What Check Point observed

According to Check Point, Nimbus Manticore ran multiple campaign waves around the conflict window. The actor continued using targeted phishing themes against aviation, software, defense, telecommunications, and related organizations, but added several notable changes:

  • Fake career and meeting lures that delivered compressed archives or trojanized installers.
  • Abuse of legitimate Microsoft-signed binaries through .NET AppDomain hijacking.
  • A trojanized Zoom installation flow designed to look normal while modifying the Zoom scheduled update task.
  • SEO poisoning around a fake SQL Developer download site to catch users searching for legitimate software.
  • A newly documented backdoor, MiniFast, with command execution, file transfer, process enumeration, persistence, and polling controls.
  • Use of valid digital signatures on some campaign files, reinforcing that signed software is not automatically trustworthy.

Why this matters

This campaign is a useful warning because it connects three trends that defenders are now seeing across modern intrusions: software trust abuse, identity-adjacent initial access, and faster malware iteration.

The fake Zoom flow is especially relevant. Users expect installers to create update tasks, launch helper processes, and place files in application directories. Nimbus Manticore abused that expectation by waiting for a legitimate-looking scheduled task and then hijacking it for the next stage. That creates a detection problem for teams that only alert on obviously suspicious persistence names.

The SEO-poisoned SQL Developer lure is just as important. Many organizations still treat search-engine downloads as a user-awareness issue instead of an endpoint-control issue. If users can install developer tools from arbitrary search results, attackers can turn ordinary productivity workflows into malware delivery paths.

Defensive takeaways for SMBs and government contractors

  • Lock down software installation paths. Require managed software sources for Zoom, developer tools, VPN clients, remote access tools, and database utilities. Do not rely on users picking the right search result.
  • Monitor scheduled task changes. Alert when existing vendor update tasks are modified, especially when command paths shift into user-writable directories or unexpected DLL-loading chains.
  • Hunt for AppDomain hijacking patterns. Look for signed executables launched alongside unusual .exe.config files that reference attacker-controlled AppDomainManager classes or DLLs.
  • Treat code signing as reputation, not proof. Signed files still need behavioral inspection, source validation, and allowlisting based on business need.
  • Block user-writable execution where possible. AppLocker, WDAC, endpoint protection policy, and EDR prevention rules can reduce the value of payloads staged under user profile paths.
  • Watch for browser-like C2 traffic from odd processes. MiniFast reportedly impersonated Chrome in HTTP traffic. User-Agent strings should not be trusted when the process, parent process, and network destination do not make sense.
  • Prioritize aviation, defense, telecom, and engineering-adjacent staff for awareness. Recruiting, meeting, and software-download lures are especially plausible against these roles.

Bulwark Black assessment

Nimbus Manticore is a good example of where Iranian cyber operations are heading: not necessarily noisier malware, but faster adaptation around trusted workflows. The campaign’s value is not only the MiniFast backdoor; it is the way the actor used normal software behavior to reduce suspicion.

For contractors supporting government, defense, aviation, infrastructure, or regulated clients, this should push two controls higher on the roadmap: managed application control and persistence-change monitoring. If a workstation can download a fake tool, execute it from a user directory, and silently alter a scheduled update task, the organization is depending too heavily on user judgment and too lightly on enforceable controls.

Original research: Check Point Research — Fast and Furious: Nimbus Manticore Operations During the Iranian Conflict.

Leave a Reply

Your email address will not be published. Required fields are marked *