Researchers at Unit 42 have identified a significant escalation in cyber-espionage activity from Screening Serpens, an advanced persistent threat (APT) group with ties to Iran. Also tracked as UNC1549, Smoke Sandstorm, and Iranian Dream Job, the group has been observed conducting campaigns between February and April 2026 that align with recent geopolitical conflicts in the Middle East. The attacks primarily target technology professionals in the United States, Israel, and the United Arab Emirates. To enhance their operations, Screening Serpens has deployed six new Remote Access Trojan (RAT) variants, categorized into two new malware families named MiniUpdate and MiniJunk V2. The group is also leveraging more sophisticated techniques, such as AppDomainManager hijacking, to maintain persistence and evade detection.
Screening Serpens is a sophisticated espionage-focused threat actor that has been active since at least 2022. Their primary objective is intelligence gathering, targeting individuals and organizations in sectors of strategic interest to Iran. The latest campaigns demonstrate a marked evolution in their capabilities:
Screening Serpens employs a multi-stage attack chain that relies on social engineering and advanced persistence mechanisms.
T1566.002 - Spearphishing Link: The initial access vector involves sending highly targeted emails with malicious links, such as the spoofed recruitment URL observed in the February 17 campaign.T1588.002 - Tool: The group develops and deploys custom RATs (MiniUpdate, MiniJunk V2) to ensure their tools are not easily detected by signature-based antivirus.T1546.011 - AppDomainManager Hijacking: This is a sophisticated persistence technique. By creating a malicious .NET assembly and setting specific environment variables (COMPLUS_Version, COMPLUS_LoaderOptimization), the attacker can force any .NET application on the system to load their malicious code upon startup. This provides a powerful and stealthy way to maintain access.T1059.005 - Visual Basic: The malware loaders often use VBScript or other scripting languages to execute the next stage of the infection chain.T1027 - Obfuscated Files or Information: The group's malware likely employs obfuscation to hinder analysis and evade static detection.The use of AppDomainManager hijacking is a significant technical advancement for this group. It allows them to live in the memory of legitimate, trusted .NET processes, making detection via traditional file-based scanning nearly impossible. This forces defenders to rely on behavioral analysis and memory forensics.
The primary impact of Screening Serpens' activities is espionage. The theft of sensitive data from technology companies can result in:
No specific file hashes, IP addresses, or domains were mentioned in the source articles.
Security teams can hunt for Screening Serpens activity. The following patterns could indicate an intrusion:
registry_keyHKCU\Environment\COMPLUS_Versioncommand_line_patternwmic.exe process call createwmic being used to launch new processes, a common technique for execution and lateral movement.log_sourceEmail Gateway Logsprocess_nameMSBuild.exeMSBuild.exe) to execute malicious code embedded in project files, bypassing application whitelisting.COMPLUS_*), unexpected network connections from legitimate processes, and the use of living-off-the-land binaries (LOLBins) like wmic.exe.COMPLUS_Version environment variable set, which is a strong indicator of the AppDomainManager hijacking technique.Train users to recognize and report sophisticated spear-phishing attempts, which are the primary initial access vector for this group.
Use application control and script blocking to prevent the execution of the initial malicious payloads delivered via phishing links.
Monitor for the creation of suspicious environment variables and registry keys associated with the AppDomainManager hijacking technique.
Hardening .NET loading mechanisms and monitoring for abuse of environment variables can help mitigate persistence techniques like AppDomainManager hijacking.
To counter Screening Serpens' primary initial access vector of spear-phishing with malicious links, organizations must implement robust URL Analysis. This should be deployed at the email gateway. Modern solutions offer 'time-of-click' protection, where every link in an incoming email is rewritten to pass through a security vendor's proxy. When a user clicks the link, the destination is analyzed in real-time for malicious content or phishing indicators. This is crucial for defeating campaigns that use benign-looking landing pages that later redirect to malware. For a campaign like the one using a spoofed recruitment URL, this technique would analyze the final destination of the link, identify the payload, and block the user from accessing it, effectively neutralizing the attack at its first stage.
The AppDomainManager hijacking technique used by Screening Serpens relies on modifying the system's environment. System File Analysis, in the form of proactive threat hunting and configuration monitoring, is essential for detection. Security teams should create and run queries using their EDR or SIEM to hunt for the presence of the COMPLUS_Version and COMPLUS_LoaderOptimization environment variables being set in the registry (HKCU\Environment or HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment). Since these variables are rarely used for legitimate purposes, their presence is a high-confidence indicator of this specific persistence technique. Regularly scanning for these artifacts allows defenders to uncover the APT's foothold before they can achieve their objectives.
To prevent the execution of the custom RATs MiniUpdate and MiniJunk V2, organizations should implement Executable Allowlisting (also known as Application Control). In a well-managed environment, especially on critical servers and for privileged users, only known and approved applications should be allowed to run. This would prevent the RAT binaries from executing, even if the user is tricked into downloading them. While challenging to deploy enterprise-wide, it is highly effective. A more targeted approach would be to use EDR in a 'block mode' where any unsigned or unknown executable is prevented from running until it can be analyzed. This directly counters the threat actor's need to drop and execute their custom malware on the target system.
A spear-phishing campaign by Screening Serpens targets a technology professional in the Middle East.
A regional conflict begins in the Middle East, coinciding with the timing of the APT campaigns.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.