Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

North Korean hackers turn JSON service into covert malware delivery channel

Five people plead guilty to helping North Koreans infiltrate US companies as ‘remote IT workers’

Researchers discover serious AI bug exposing Meta, Nvidia, and Microsoft inference frameworks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Iranian hackers launch espionage operation ‘Spear Specter’ targeting national defense and government
Identity

Iranian hackers launch espionage operation ‘Spear Specter’ targeting national defense and government

userBy userNovember 14, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

An Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations of interest to the Islamic Revolutionary Guards Corps (IRGC) as part of a new espionage-focused campaign.

This activity was detected in early September 2025, is assessed to be ongoing, and has been codenamed “SpearSpecter” by the Israel National Digital Agency (INDA).

“This campaign systematically targets high-value defense and government officials using personalized social engineering tactics,” said INDA researchers Simi Cohen, Adi Pick, Idan Beityousev, Hilla David, and Yaniv Goldman. “This includes inviting the target to prestigious meetings or arranging important meetings.”

What is notable about this effort is that it extends to the target’s family members, creating a broader attack surface and putting even more pressure on the primary target.

APT42 was first publicly documented by Google Mandiant in late 2022 and is another IRGC tracked as APT35, CALANQUE, Charming Kitten, CharmingCypress, Cobalt Illusion, Educated Manticore, GreenCharlie, ITG18, Magic Hound, Mint Sandstorm (formerly Phosphorus), TA453, Yellow Garuda Overlap with threat clusters is detailed.

DFIR retainer service

One of the group’s hallmarks is its ability to launch persuasive social engineering campaigns that can run for days or weeks to build trust with targets before sending malicious payloads or getting them to click on booby-trapped links. In some cases, they masquerade as known contacts to create the illusion of authenticity.

As of June 2025, Check Point detailed a wave of attacks in which attackers approached Israeli technology and cybersecurity experts in emails and WhatsApp messages posing as technology executives and researchers.

Goldman told Hacker News that the SpearSpectre and June 2025 campaigns are separate and were carried out by two different subgroups within APT42.

“While our campaign was executed by APT42’s Cluster D (focused on malware-based operations), the campaign detailed by Check Point was executed by the same group’s Cluster B (focused on credential harvesting),” Goldman added.

INDA said SpearSpecter is flexible in that an adversary can fine-tune its approach based on target value and operational objectives. In a series of attacks, victims are redirected to a fake conference page designed to capture their credentials. On the other hand, if the end goal is persistent long-term access, the attack leads to the deployment of a known PowerShell backdoor called TAMECAT, which has been used repeatedly in recent years.

To do so, the attack chain involves sending a malicious link to a document required for an upcoming meeting or conference, impersonating a trusted WhatsApp contact. Clicking the link initiates a redirection chain that leverages the “search-ms:” protocol handler to serve a WebDAV-hosted Windows shortcut (LNK) disguised as a PDF file.

The LNK file establishes a connection with the Cloudflare Workers subdomain to obtain a batch script that acts as a loader for TAMECAT. Thereby, TAMECAT uses various modular components to facilitate data extraction and remote control.

The PowerShell framework uses three different channels for command and control (C2): HTTPS, Discord, and Telegram. This suggests a threat actor’s goal to maintain persistent access to a compromised host even if one route is detected and blocked.

For Telegram-based C2, TAMECAT listens for incoming commands from an attacker-controlled Telegram bot and based on that retrieves and executes additional PowerShell code from various Cloudflare Workers subdomains. For Discord, webhook URLs are used to send basic system information and retrieve commands from hardcoded channels.

CIS build kit

“Analysis of accounts recovered from the attacker’s Discord server suggests that the command search logic relies on messages from specific users, allowing the attacker to coordinate multiple attacks using the same channel while delivering commands specific to individual infected hosts, effectively building a collaborative space on a single infrastructure,” INDA researchers said.

Additionally, TAMECAT is equipped with the ability to perform reconnaissance, collect files matching specific extensions, steal data from web browsers such as Google Chrome and Microsoft Edge, collect Outlook mailboxes, and take screenshots at 15-second intervals. Data is extracted via HTTPS or FTP.

It also employs various stealth techniques to avoid detection and resist analysis efforts. These include encrypting telemetry and controller payloads, obfuscating source code, using resident binaries (LOLBins) to hide malicious activity, and operating primarily in memory, leaving little trace on disk.

“The SpearSpecter campaign infrastructure reflects a sophisticated blend of agility, stealth, and operational security designed to sustain long-term espionage against high-value targets,” INDA said. “Operators leverage a multifaceted infrastructure that combines legitimate cloud services and attacker-controlled resources to enable seamless initial access, persistent command and control (C2), and secret data exfiltration.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew malaria vaccine offers hope for mothers and babies in Africa
Next Article Pixel 10 Pro Fold review: Google’s bet to make foldable devices tougher
user
  • Website

Related Posts

North Korean hackers turn JSON service into covert malware delivery channel

November 14, 2025

Researchers discover serious AI bug exposing Meta, Nvidia, and Microsoft inference frameworks

November 14, 2025

LockBit is back, but ransomware fragmentation reaches breaking point

November 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

North Korean hackers turn JSON service into covert malware delivery channel

Five people plead guilty to helping North Koreans infiltrate US companies as ‘remote IT workers’

Researchers discover serious AI bug exposing Meta, Nvidia, and Microsoft inference frameworks

Pine Labs receives enthusiastic reception from market with $440 million Indian IPO despite valuation cut

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.