When the Hunters Get Hunted: The Amnban Leak and the End of a Years-Long Espionage Campaign

Amnban Leak - ZENDATA

One of the most significant exposures of a state-sponsored cyber-espionage operation in recent years came to light. Internal files from Amnban Sharif Advanced Technologies, an ostensibly legitimate Iranian cybersecurity firm, were leaked in full view of the global community.

The breach revealed what many in the intelligence and cybersecurity sectors had long suspected. Amnban was not simply a consultancy safeguarding Iranian networks. It was a covert operations unit, embedded within Iran’s Ministry of Intelligence and Security (MOIS), and tasked with systematically attacking airlines, freight companies, and cryptocurrency exchanges across the world.

Gigabytes of data, including reconnaissance videos, passenger lists, passport records, operational plans, and server configurations, clearly document a years-long campaign carried out under the cover of professional security services.

This leak is not just an exposé of espionage. It is also a case study in how overconfidence, hubris, and operational complacency can destroy even the most sophisticated offensive campaigns.

 

An Anonymous Leak: Insider or Hacktivist?

At the center of the story lies an important question. How did the leak happen? The files were provided anonymously to journalist Nariman Gharib, who published an extensive analysis of their contents.

There are two plausible explanations.

The first is that this was an insider leak. Given that the leak contains sensitive internal folders, operational videos, and personal details of employees and clients, it is entirely feasible that a disillusioned or opportunistic employee decided to expose the organization from within. Notably, one of the named employees reportedly relocated to the United States shortly before the publication of the files.

The second possibility is that an external actor breached Amnban’s infrastructure. Groups like Predatory Sparrow, which have conducted high-profile sabotage and leak operations against Iranian assets in the past, are known for their ability to penetrate sensitive networks and turn the tables on their adversaries.

Whichever path was taken, the result is the same. Amnban’s operations have been burned, its credibility destroyed, and its handlers at MOIS publicly embarrassed.

 

The Strategic Impact: Isolation and Exposure

This episode goes beyond a single operational failure. It accelerates Iran’s isolation and undermines its standing even among neutral or allied nations.

The target list included carriers from countries that Iran has publicly considered friendly, alongside those it regards as adversarial. Airlines from Turkey, Russia, Qatar, and Kenya all appeared alongside those from Jordan, the UAE, and European nations. For every government now reviewing the evidence, trust in Iranian entities will become even more difficult to justify.

The leak also ends what appears to have been a methodical, multi-year intelligence-gathering campaign. The shaming effect of such a public disclosure is considerable. Iran has lost a valuable intelligence asset, and the global community has been handed a rare opportunity to study its techniques in detail.

 

Technical Analysis: Why the Malware Was Advanced and Stealthy
One of the most remarkable elements of the Amnban breach is how it revealed the sophistication of the Iranian tools. The Trailblazer malware family, used in these campaigns, is not commodity ransomware or generic spyware. It was purpose-built for covert, long-term espionage.

Here are the key technical characteristics that made it advanced and stealthy:

 

1. In-Memory Execution

Trailblazer leveraged an in-memory C# loader, which allowed the payload to be executed directly in the system’s memory rather than written to disk.
Most antivirus and endpoint detection tools focus on scanning files stored on disk. By avoiding disk writes, Trailblazer evaded many signature-based defenses. This technique also minimizes forensic artifacts, making it harder to reconstruct what happened after the fact.

 

2. Encrypted and Obfuscated Communication

Command-and-control (C2) traffic was hidden by using TLS-encrypted beacons that mimicked legitimate Microsoft Graph traffic.

  • Microsoft Graph is used by many enterprises as part of Office 365 and Teams, so outbound traffic to its domains is rarely blocked or scrutinized.
  • The malware generated network activity that blended seamlessly into normal business operations, allowing it to persist longer without detection.
  • Some of the fake C2 domains included deceptive names like api-azurecloud.com, designed to look legitimate.

 

3. Modular and Flexible Architecture

The payload was modular, supporting:

  • Data exfiltration of specific target files (passenger manifests, VPN configs, passport scans)
  • Credential harvesting
  • Lateral movement scripts and components, loaded as needed to minimize footprint

This modular design reduced the amount of code running at any one time, keeping activity below the noise threshold of behavioral analysis tools.

 

4. Use of Stolen Legitimate Credentials

The attackers supplemented malware with stolen admin or API credentials, allowing them to bypass endpoint protections entirely in some cases and move through systems “as a legitimate user”. This hybrid approach of malware for persistence and credential abuse for movement  is typical of advanced persistent threats.

 

5. Psychological and Social Engineering Layer

On the human side, the campaign involved:

  • Confusing helpdesk agents by speaking in an incomprehensible language and tricking them into clicking links
  • Creating fake LinkedIn profiles to build trust and offer bribes or freelance contracts to insiders
  • Once victims clicked, the malware could drop in silently and immediately phone home.

The Amnban leak serves as a decisive moment in the ongoing evolution of cyber conflict. It reinforces the reality that cyberspace is not a domain where actors can operate indefinitely without accountability. When operations are revealed, the cost is not just operational disruption but also reputational damage and geopolitical consequences.

For Iran, the fallout will likely include the dismantling of Amnban’s operations and the search for those responsible for the leak. For the broader community, this episode provides an opportunity to study the tactics of APT39 and prepare more robust defenses against similar campaigns.

Link to the article

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

New EDR Killer Tool Used by Multiple Ransomware Groups

New EDR Killer Tool Used by Multiple Ransomware Groups

A zero-day flaw in the Lovense app

Lovense App Flaw Exposes User Emails

Aeroflot Cyberattack 2025: Pro-Ukraine Hackers Disrupt Russian Flights

Aeroflot Cyberattack 2025: Pro-Ukraine Hackers Disrupt Russian Flights