LR pixel

What is the Attack?

A suspected Iran-linked espionage group tracked as UNC1549 is actively targeting aerospace, defense, and telecommunications organizations across Europe and other regions. The threat actor employs a combination of highly tailored spear-phishing, credential theft from third-party services, and abuse of virtual desktop infrastructure such as Citrix, VMware, and Azure VDI to gain initial access and move laterally within target networks.

These activities align with state-sponsored intelligence objectives, including the theft of sensitive technical data, monitoring of communications, and long-term strategic positioning within high-value targets.

UNC1549 employs a range of custom malware families and stealth techniques to maintain persistent and covert access. MINIBIKE is a modular backdoor used to steal credentials, log keystrokes, capture screenshots, and deploy additional payloads. TWOSTROKE enables remote access, system control, and persistence, while DEEPROOT extends similar functionality to Linux environments. For stealthy command-and-control, the group leverages LIGHTRAIL and GHOSTLINE, tunneling tools that disguise malicious communications within legitimate cloud traffic to facilitate covert data exfiltration and resilient connectivity.

What is the recommended Mitigation?

  • Review FortiEDR / FortiEndpoint alerts for MINIBIKE, TWOSTROKE, and DEEPROOT activity.

  • Investigate unusual network traffic correlating with LIGHTRAIL or GHOSTLINE C2 patterns.

  • Audit third-party and supplier accounts for suspicious activity or unauthorized access.

  • Ensure MFA, patching, and access control policies are enforced across high-value systems.

  • Maintain ongoing threat intelligence updates to respond to emerging UNC1549 Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoCs).

  • Monitor for suspicious third-party access or anomalous account activity.

  • Implement multi-factor authentication (MFA) and strict supplier access controls.

  • Apply least privilege principles for VDI and remote access services (Citrix, VMware, Azure VDI).

What FortiGuard Coverage is available?


  • Endpoint Protection:


    – FortiEDR / FortiEndpoint detects and blocks MINIBIKE, TWOSTROKE, and DEEPROOT malware families.

    – FortiSandbox and FortiEDR behavior-based detection identify unknown malware, persistence techniques, and unauthorized system modifications.


  • Network & Exploit Protection:


    – FortiGuard IPS Service detects and blocks exploit attempts targeting vulnerabilities leveraged by UNC1549.

    – FortiGuard Web Filtering Service protects against malicious URLs, domains, IPs, and other attacker-controlled infrastructure linked to this campaign.


  • Threat Hunting & Incident Response:


    – FortiAnalyzer, FortiSIEM, and FortiSOAR integrate known Indicators of Compromise (IoCs) via the IoC Service, enabling advanced threat hunting, automated correlation, and rapid incident response.

    – FortiGuard Labs continuously monitors for newly emerging IoCs, ensuring proactive protection against evolving threat activity.

  • Organizations suspecting compromise can contact the FortiGuard Incident Response team for rapid investigation and remediation support.