A suspected Iran-linked threat actor named Dust Specter targeted Iraqi government officials by impersonating the Ministry of Foreign Affairs, deploying new malware like SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. The campaign used compromised government infrastructure and sophisticated evasion techniques, including geofencing and file-based polling for command execution. The malware employed sideloading and in-memory execution to avoid detection, with one variant using a fake Arabic-language survey hosted on Google Forms. Evidence suggests the attackers may have used generative AI tools in the malware's development.