Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The first signs of burnout are coming from those who embrace AI the most

Fortinet patches critical SQLi flaw that allows unauthenticated code execution

MrBeast’s company acquires Gen Z-focused fintech app Step

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Iranian hackers misuse email accounts of over 100 embassies in global phishing targeting diplomats
Identity

Iranian hackers misuse email accounts of over 100 embassies in global phishing targeting diplomats

userBy userSeptember 3, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 3, 2025Ravi LakshmananData Breach/Cyberspy

The Iranian and Nexus groups are linked to “coordinated” and “multiwave” spear fishing campaigns targeting embassies and consulates in Europe and other regions around the world.

The activity stems from operators lined with Iranians associated with the broader range of offensive cyber activities carried out by a group known as the National Judiciary, due to the dream of Israeli cybersecurity companies.

“The emails were sent to multiple government recipients around the world, disguised as legitimate diplomatic communications,” the company said. “The evidence points to a wider range of local espionage targeting diplomatic and government groups during a period of growing geopolitical tensions.”

Audit and subsequent

The attack chain involves the use of spear phishing emails, which include themes related to geopolitical tensions between Iran and Israel, prompting recipients to “enable content” to perform the embedded visual basics of application (VBA) macros responsible for loading and administration of malware when opened.

Dream-by-dream email messages are sent to embassies, consulates and international organizations in the Middle East, Africa, Europe, Asia and the US, suggesting that activities throw wide phishing nets. European embassies and African organizations are said to have been the most heavily targeted.

Digital Missive was sent from 104 unique compromised addresses belonging to staff and pseudo-government agencies, providing an extra layer of reliability. At least some of the emails come from hacked mailboxes (*@fm.gov.om) belonging to the Oman Foreign Ministry in Paris.

“Lure content consistently utilized the common practice of referring to urgent MFA communications, communicating authority and ensuring macros have access to the content, a feature of well-planned spying activities that are intentionally masked attribution,” Dream said.

The ultimate goal of the attack is to use VBA Macro to deploy an executable that can establish persistence, contact a command and control (C2) server, and harvest system information.

CIS Build Kit

Cybersecurity firm Clearsky detailed several aspects of the campaign later last month, saying the phishing emails were sent to multiple foreign ministries.

“Similar obfuscation techniques were used by Iranian threat actors when targeting Albania’s Mojahedin et Kalk in 2023, noted in X’s post.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe UK launches Horizon Europe program campaign in Spain and Germany
Next Article Can I change the tide?
user
  • Website

Related Posts

Fortinet patches critical SQLi flaw that allows unauthenticated code execution

February 10, 2026

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

February 9, 2026

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The first signs of burnout are coming from those who embrace AI the most

Fortinet patches critical SQLi flaw that allows unauthenticated code execution

MrBeast’s company acquires Gen Z-focused fintech app Step

Databricks CEO says SaaS isn’t dead, but AI will soon make it worthless

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.