{"id":133039,"date":"2024-01-17T09:00:00","date_gmt":"2024-01-17T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=133039"},"modified":"2025-07-23T05:57:37","modified_gmt":"2025-07-23T12:57:37","slug":"new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/","title":{"rendered":"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, Mint Sandstorm used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files. In a handful of cases, Microsoft observed new post-intrusion tradecraft including the use of a new, custom backdoor called MediaPl.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Operators associated with this subgroup of Mint Sandstorm are patient and highly skilled social engineers whose tradecraft lacks many of the hallmarks that allow users to quickly identify phishing emails. In some instances of this campaign, this subgroup also used legitimate but compromised accounts to send phishing lures. Additionally, Mint Sandstorm continues to improve and modify the tooling used in targets\u2019 environments, activity that might help the group persist in a compromised environment and better evade detection.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Mint Sandstorm (which overlaps with the threat actor tracked by other researchers as APT35 and Charming Kitten)&nbsp;is a composite name used to describe several subgroups of activity with ties to the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/09\/microsoft-shares-threat-intelligence-at-cyberwarcon-2023\/#iran-role-in-the-israel-hamas-war\">Islamic Revolutionary Guard Corps (IRGC)<\/a>, an intelligence arm of Iran\u2019s military. Microsoft attributes the activity detailed in this blog to <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2023\/11\/09\/microsoft-shares-threat-intelligence-at-cyberwarcon-2023\/#iran-role-in-the-israel-hamas-war\">a technically and operationally mature subgroup<\/a> of Mint Sandstorm that specializes in gaining access to and stealing sensitive information from high-value targets. This group is known to conduct resource-intensive social engineering campaigns that target journalists, researchers, professors, or other individuals with insights or perspective on security and policy issues of interest to Tehran.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">These individuals, who work with or who have the potential to influence the intelligence and policy communities, are attractive targets for adversaries seeking to collect intelligence for the states that sponsor their activity, such as the Islamic Republic of Iran. Based on the identities of the targets observed in this campaign and the use of lures related to the Israel-Hamas war, it\u2019s possible this campaign is an attempt to gather perspectives on events related to the war from individuals across the ideological spectrum.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this blog, we share our analysis of the new Mint Sandstorm tradecraft and provide detection, hunting, and protection information. Organizations can also use the mitigations included in this blog to harden their attack surfaces against the tradecraft observed in this and other Mint Sandstorm campaigns. These mitigations are high-value measures that are effective ways to defend organizations from multiple threats, including Mint Sandstorm, and are useful to any organization regardless of their threat model.<\/p>\n\n\n\n<div class=\"alignright wp-block-bloginabox-theme-kicker\" data-bi-an=\"Kicker Left\">\n\t<div class=\"kicker\">\n\t\t<h2 class=\"kicker__title\">\n\t\t\tGet the latest Microsoft Threat Intelligence updates\t\t<\/h2>\n\t\t<p class=\"kicker__content\">\n\t\t\t\t\t\t\t<a\n\t\t\t\t\thref=\"#learn-more\"\n\t\t\t\t\tclass=\"kicker__link\"\n\t\t\t\t\ttarget=\"_blank\" rel=\"noopener noreferrer\"\t\t\t\t>\n\t\t\t\t\t\tJump to social\t\t\t\t\t\t\t\u2197<\/a>\n\t\t\t\t\t<\/p>\n\t<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"new-mint-sandstorm-tradecraft\">New Mint Sandstorm tradecraft<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft observed new tactics, techniques, and procedures (TTPs) in this Mint Sandstorm campaign, notably the use of legitimate but compromised email accounts to send phishing lures, use of the Client for URL (curl) command to connect to Mint Sandstorm\u2019s command-and-control (C2) server and download malicious files, and delivery of a new custom backdoor, MediaPl.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"social-engineering\">Social engineering<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">In this campaign, Mint Sandstorm masqueraded as high-profile individuals including as a journalist at a reputable news outlet. In some cases, the threat actor used an email address spoofed to resemble a personal email account belonging to the journalist they sought to impersonate and sent benign emails to targets requesting their input on an article about the Israel-Hamas war. In other cases, Mint Sandstorm used legitimate but compromised email accounts belonging to the individuals they sought to impersonate. Initial email messages did not contain any malicious content.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This tradecraft, namely the impersonation of a known individual, the use of highly bespoke phishing lures, and the use of wholly benign messages in the initial stages of the campaign, is likely an attempt to build rapport with targets and establish a level of trust before attempting to deliver malicious content to targets. Additionally, it\u2019s likely that the use of legitimate but compromised email accounts, observed in a subset of this campaign, further bolstered Mint Sandstorm\u2019s credibility, and might have played a role in the success of this campaign.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"delivery\">Delivery<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">If targets agreed to review the article or document referenced in the initial email, Mint Sandstorm followed up with an email containing a link to a malicious domain. In this campaign, follow up messages directed targets to sites such as <em>cloud-document-edit[.]onrender[.]com,<\/em> a domain hosting a RAR archive (<em>.rar<\/em>) file that purported to contain the draft document targets were asked to review. If opened, this <em>.rar<\/em> file decompressed into a <a href=\"https:\/\/attack.mitre.org\/techniques\/T1036\/007\/\" target=\"_blank\" rel=\"noreferrer noopener\">double extension<\/a> file (<em>.pdf.lnk<\/em>) with the same name. When launched, the <em>.pdf.lnk <\/em>file ran a curl command to retrieve a series of malicious files from attacker-controlled subdomains of <em>glitch[.]me<\/em> and <em>supabase[.]co<\/em>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft observed multiple files downloaded to targets\u2019 devices in this campaign, notably several .<em>vbs<\/em> scripts. In several instances, Microsoft observed a renamed version of <a href=\"https:\/\/www.nirsoft.net\/utils\/nircmd.html\" target=\"_blank\" rel=\"noreferrer noopener\">NirCmd<\/a>, a legitimate command line tool that allows a user to carry out a number of actions on a device without displaying a user interface, on a target\u2019s device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"persistence\">Persistence<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">In some cases, the threat actor used a malicious file, <em>Persistence.vbs<\/em>, to persist in targets\u2019 environments. When run, <em>Persistence.vbs<\/em> added a file, typically named <em>a.vbs<\/em>, to the <em>CurrentVersionRun<\/em> registry key. In other cases, Mint Sandstorm created a scheduled task to reach out to an attacker-controlled <em>supabase[.]co<\/em> domain and download a <em>.txt<\/em> file.<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Fig-1.Intrusion-chain-leading-to-backdoors-observed-in-the-ongoing-Mint-Sandstorm-campaign-1024x466.webp\" alt=\"Intrusion chain leading to backdoors observed in the ongoing Mint Sandstorm campaign\" class=\"wp-image-133046 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Fig-1.Intrusion-chain-leading-to-backdoors-observed-in-the-ongoing-Mint-Sandstorm-campaign-1024x466.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Fig-1.Intrusion-chain-leading-to-backdoors-observed-in-the-ongoing-Mint-Sandstorm-campaign-300x137.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Fig-1.Intrusion-chain-leading-to-backdoors-observed-in-the-ongoing-Mint-Sandstorm-campaign-768x350.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Fig-1.Intrusion-chain-leading-to-backdoors-observed-in-the-ongoing-Mint-Sandstorm-campaign-1536x699.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Fig-1.Intrusion-chain-leading-to-backdoors-observed-in-the-ongoing-Mint-Sandstorm-campaign.webp 1652w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Fig-1.Intrusion-chain-leading-to-backdoors-observed-in-the-ongoing-Mint-Sandstorm-campaign-1024x466.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 1. Intrusion chain leading to backdoors observed in the ongoing Mint Sandstorm campaign<\/em><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"collection\">Collection<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Activity observed in this campaign suggests that Mint Sandstorm wrote activity from targets\u2019 devices to a series of text files, notably one named <em>documentLoger.txt.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition to the activity detailed above, in some cases, Mint Sandstorm dropped MischiefTut or MediaPl, custom backdoors.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mediapl-backdoor\">MediaPl backdoor<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">MediaPl is a custom backdoor capable of sending encrypted communications to its C2 server. MediaPl is configured to masquerade as Windows Media Player, an application used to store and play audio and video files. To this end, Mint Sandstorm typically drops this file in <em>C:\\Users\\[REDACTED] \\AppData\\Local\\Microsoft\\Media Player\\MediaPl.dll<\/em>. When MediaPl.dll is run with the path of an image file provided as an argument, it launches the image in Windows Photo application and also parses the image for C2 information. Communications to and from MediaPl\u2019s C2 server are AES CBC encrypted and Base64 encoded. As of this writing, MediaPl can terminate itself, can pause and retry communications with its C2 server, and launch command(s) it has received from the C2 using the <a href=\"https:\/\/learn.microsoft.com\/cpp\/c-runtime-library\/reference\/popen-wpopen\">_popen function<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mischieftut\">MischiefTut<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/ti.defender.microsoft.com\/articles\/73494616\">MischiefTut<\/a> is a custom backdoor implemented in PowerShell with a set of basic capabilities. MischiefTut can run reconnaissance commands, write outputs to a text file and, ostensibly, send outputs back to adversary-controlled infrastructure. MischiefTut can also be used to download additional tools on a compromised system.<strong><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"implications\">Implications<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The ability to obtain and maintain remote access to a target\u2019s system can enable Mint Sandstorm to conduct a range of activities that can adversely impact the confidentiality of a system. Compromise of a targeted system can also create legal and reputational risks for organizations affected by this campaign. In light of the patience, resources, and skills observed in campaigns attributed to this subgroup of Mint Sandstorm, Microsoft continues to update and augment our detection capabilities to help customers defend against this threat.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"recommendations\">Recommendations<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft recommends the following mitigations to reduce the impact of activity associated with recent Mint Sandstorm campaigns.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Use the Attack Simulator in&nbsp;<a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/office-365-security\/attack-simulation-training-simulations\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Office 365<\/a>&nbsp;to organize realistic, yet safe, simulated phishing and password attack campaigns in your organization by training end-users against clicking URLs in unsolicited messages and disclosing their credentials. Training should include checking for poor spelling and grammar in phishing emails or the application\u2019s consent screen as well as spoofed app names, logos and domain URLs appearing to originate from legitimate applications or companies. Note that Attack Simulator testing only supports phishing emails containing links at this time.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Encourage users to use Microsoft Edge and other web browsers that support&nbsp;<a href=\"https:\/\/learn.microsoft.com\/windows\/security\/threat-protection\/microsoft-defender-smartscreen\/microsoft-defender-smartscreen-overview\" target=\"_blank\" rel=\"noreferrer noopener\">SmartScreen<\/a>, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that contain exploits and host malware. Turn on&nbsp;<a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/enable-network-protection\" target=\"_blank\" rel=\"noreferrer noopener\">network protection<\/a>&nbsp;to block connections to malicious domains and IP addresses.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Turn on&nbsp;<a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/cloud-protection-microsoft-defender-antivirus\" target=\"_blank\" rel=\"noreferrer noopener\">cloud-delivered protection<\/a>&nbsp;in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a majority of new and unknown variants.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender XDR customers can also turn on&nbsp;<a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/attack-surface-reduction\" target=\"_blank\" rel=\"noreferrer noopener\">attack surface reduction rules<\/a>&nbsp;to harden their environments against techniques used by this Mint Sandstorm subgroup. These rules, which can be configured by all Microsoft Defender Antivirus customers and not just those using the EDR solution, offer significant protection against the tradecraft discussed in this report.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/attack-surface-reduction-rules-reference#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion\" target=\"_blank\" rel=\"noreferrer noopener\">Block executable files from running unless they meet a prevalence, age, or trusted list criterion<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/attack-surface-reduction-rules-reference?view=o365-worldwide#block-javascript-or-vbscript-from-launching-downloaded-executable-content\">Block JavaScript or VBScript from launching downloaded executable content<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/attack-surface-reduction-rules-reference?view=o365-worldwide#block-execution-of-potentially-obfuscated-scripts\">Block execution of potentially obfuscated scripts<\/a>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"detection-details\">Detection details<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-defender-antivirus\">Microsoft Defender Antivirus<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender Antivirus detects activity associated with the MediaPl backdoor as the following malware:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Backdoor:Win64\/Eyeglass.A!dha&amp;threatId=-2147066578\">Backdoor:Win64\/Eyeglass.A<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender Antivirus detects activity associated with the MischiefTut backdoor as the following <em>malware<\/em>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Behavior:Win32\/MischiefTut!dha&amp;threatId=-2147131910\">Behavior:Win32\/MischiefTut<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-defender-for-endpoint\">Microsoft Defender for Endpoint<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender for Endpoint provides customers with detections and alerts. Alerts with the following titles in the Security Center can indicate threat activity related to Mint Sandstorm.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Possible Mint Sandstorm activity<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Anomaly detected in ASEP registry<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"threat-intelligence-reports\">Threat intelligence reports<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft customers can use the following reports in Microsoft products to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide the intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-defender-threat-intelligence\">Microsoft Defender Threat Intelligence<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/security.microsoft.com\/intel-explorer\/articles\/2f60cd65\">Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/security.microsoft.com\/intel-explorer\/articles\/73494616\">Mint Sandstorm delivers MischiefTut to researchers in tailored phishing campaigns<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-defender-xdr-threat-analytics\">Microsoft Defender XDR Threat analytics&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/security.microsoft.com\/threatanalytics3\/ca9c8fe6-1989-4332-a6a2-2e8694e58568\/analystreport?search=mint%2520sandstorm\">Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"indicators-of-compromise\">Indicators of compromise<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Organizations who fit the targeting model discussed in this report can hunt for the following indicators of compromise in their environments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"domains\">Domains<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><em>east-healthy-dress[.]glitch[.]me<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><em>coral-polydactyl-dragonfruit[.]glitch[.]me<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><em>kwhfibejjyxregxmnpcs[.]supabase[.]co<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><em>epibvgvoszemkwjnplyc[.]supabase[.]co<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><em>ndrrftqrlblfecpupppp[.]supabase[.]co<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><em>cloud-document-edit[.]onrender[.]com<\/em><em><\/em><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"files\">Files<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><em>MediaPl.dll<\/em> (SHA-256: <em>f2dec56acef275a0e987844e98afcc44bf8b83b4661e83f89c6a2a72c5811d5f<\/em>)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"advanced-hunting\">Advanced hunting<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-defender-xdr\">Microsoft Defender XDR<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Curl command used to retrieve malicious files<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Use this query to locate the curl command Mint Sandstorm used to pull down malicious files in this campaign.<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nDeviceProcessEvents\n| where InitiatingProcessCommandLine has_all('id=',\n'&Prog') and InitiatingProcessCommandLine has_any('vbs', '--ssl')\n\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\"><strong>Creation of log files<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Use this query to identify files created by Mint Sandstorm, ostensibly for exfiltration.<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nDeviceProcessEvents\n| where InitiatingProcessCommandLine has_all('powershell', '$pnt', 'Get-Content', 'gcm') and InitiatingProcessCommandLine has_any('documentLog', 'documentLoger', 'Logdocument')\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\"><strong>Files with double file name extensions<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Use this query to find files with double extension, e.g., .pdf.lnk.<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nDeviceFileEvents\n| where FileName endswith \".pdf.lnk\"\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\"><strong>Registry keys with VBScript<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Use this query to find registry run keys entry with VBScript in value<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nDeviceRegistryEvents\n| where ActionType == \"RegistryValueSet\" or ActionType == \"RegistryKeyCreated\"\n| where RegistryKey endswith @\"SoftwareMicrosoftWindowsCurrentVersionRun\" or \nRegistryKey endswith @\"SoftwareMicrosoftWindowsCurrentVersionRunOnce\" or\nRegistryKey endswith @\"SoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerRun\"\n| where RegistryValueData has_any (\"vbscript\",\".vbs\")\n<\/pre><\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-sentinel\">Microsoft Sentinel<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with \u2018TI map\u2019) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the <a href=\"https:\/\/learn.microsoft.com\/azure\/sentinel\/sentinel-solutions-deploy\">Microsoft Sentinel Content Hub<\/a> to have the analytics rule deployed in their Sentinel workspace.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Microsoft%20Defender%20XDR\/Hunting%20Queries\/EmailDelivered-ToInbox.yaml\">Email delivered to inbox<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Microsoft%20Defender%20XDR\/Hunting%20Queries\/Delivered%20Bad%20Emails%20from%20Top%20bad%20IPv4%20addresses.yaml\">Delivered bad emails from top bad IPv4 addresses<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/PhishinglinkExecutionObserved.yaml\">Phishing link execution observed<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/SucessfullSiginFromPhingLink.yaml\">Successful sign-in from phishing link<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/Microsoft%20365%20Defender\/Initial%20access\/SuspiciousUrlClicked.yaml\">Suspicious URL clicked<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Endpoint%20Threat%20Protection%20Essentials\/Hunting%20Queries\/ScheduledTaskCreationUpdateFromUserWritableDrectory.yaml\">Scheduled task creation update from user writable directory<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/SecurityEvent\/RemoteScheduledTaskCreationUpdateviaSchtasks.yaml\">Remote Scheduled Task creation update via Schtasks<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog:&nbsp;<a href=\"https:\/\/aka.ms\/threatintelblog\">https:\/\/aka.ms\/threatintelblog<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To get notified about new publications and to join discussions on social media, follow us on LinkedIn at <a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-threat-intelligence\">https:\/\/www.linkedin.com\/showcase\/microsoft-threat-intelligence<\/a>, and on X (formerly Twitter) at&nbsp;<a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/MsftSecIntel<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast: <a href=\"https:\/\/thecyberwire.com\/podcasts\/microsoft-threat-intelligence\">https:\/\/thecyberwire.com\/podcasts\/microsoft-threat-intelligence<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, the threat actor used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files.<\/p>\n","protected":false},"author":153,"featured_media":133044,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[132866,131580,132273,127280],"footnotes":""},"post_tag":[3905,3922],"threat-intelligence":[3727,3736,3738],"content-type":[3663],"job-role":[],"product":[3690,3694,3695,3693,3726],"topic":[3687],"coauthors":[3380],"class_list":["post-133039","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-mint-sandstorm-phosphorus","tag-sandstorm","threat-intelligence-attacker-techniques-tools-and-infrastructure","threat-intelligence-social-engineering-phishing","threat-intelligence-threat-actors","content-type-research","product-microsoft-defender","product-microsoft-defender-for-endpoint","product-microsoft-defender-for-office-365","product-microsoft-defender-xdr","product-microsoft-sentinel","topic-threat-intelligence","review-flag-1694638265-576","review-flag-1694638265-310","review-flag-1694638271-781","review-flag-1-1694638265-354","review-flag-machi-1694638272-641","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"A distinct subset of Mint Sandstorm targets high-profile individuals working on Middle Eastern affairs at universities and research orgs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"A distinct subset of Mint Sandstorm targets high-profile individuals working on Middle Eastern affairs at universities and research orgs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-17T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T12:57:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-social-card-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Threat Intelligence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Threat Intelligence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Threat Intelligence\"}],\"headline\":\"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs\",\"datePublished\":\"2024-01-17T17:00:00+00:00\",\"dateModified\":\"2025-07-23T12:57:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/\"},\"wordCount\":2012,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-blog-featured-image.jpg\",\"keywords\":[\"Mint Sandstorm (PHOSPHORUS)\",\"Sandstorm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/\",\"name\":\"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-blog-featured-image.jpg\",\"datePublished\":\"2024-01-17T17:00:00+00:00\",\"dateModified\":\"2025-07-23T12:57:37+00:00\",\"description\":\"A distinct subset of Mint Sandstorm targets high-profile individuals working on Middle Eastern affairs at universities and research orgs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-blog-featured-image.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-blog-featured-image.jpg\",\"width\":1201,\"height\":802,\"caption\":\"Coworkers discuss business while walking through a modern office\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/fa785acae88a9b0cfe278a692ce196f5\",\"name\":\"Microsoft Security Threat Intelligence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g430eaf64ccad6ceda364c6ea504461c5\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Security Threat Intelligence\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-katiemc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs | Microsoft Security Blog","description":"A distinct subset of Mint Sandstorm targets high-profile individuals working on Middle Eastern affairs at universities and research orgs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/","og_locale":"en_US","og_type":"article","og_title":"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs | Microsoft Security Blog","og_description":"A distinct subset of Mint Sandstorm targets high-profile individuals working on Middle Eastern affairs at universities and research orgs.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/","og_site_name":"Microsoft Security Blog","article_published_time":"2024-01-17T17:00:00+00:00","article_modified_time":"2025-07-23T12:57:37+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-social-card-1024x576.png","type":"image\/png"}],"author":"Microsoft Threat Intelligence","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Threat Intelligence","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/","@type":"Person","@name":"Microsoft Threat Intelligence"}],"headline":"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs","datePublished":"2024-01-17T17:00:00+00:00","dateModified":"2025-07-23T12:57:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/"},"wordCount":2012,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-blog-featured-image.jpg","keywords":["Mint Sandstorm (PHOSPHORUS)","Sandstorm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/","name":"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-blog-featured-image.jpg","datePublished":"2024-01-17T17:00:00+00:00","dateModified":"2025-07-23T12:57:37+00:00","description":"A distinct subset of Mint Sandstorm targets high-profile individuals working on Middle Eastern affairs at universities and research orgs.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-blog-featured-image.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Mint-Sandstorm-blog-featured-image.jpg","width":1201,"height":802,"caption":"Coworkers discuss business while walking through a modern office"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/17\/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/fa785acae88a9b0cfe278a692ce196f5","name":"Microsoft Security Threat Intelligence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g430eaf64ccad6ceda364c6ea504461c5","url":"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g","caption":"Microsoft Security Threat Intelligence"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-katiemc\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/133039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=133039"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/133039\/revisions"}],"predecessor-version":[{"id":141456,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/133039\/revisions\/141456"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/133044"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=133039"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=133039"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=133039"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=133039"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=133039"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=133039"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=133039"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=133039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}