Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CRESCENTHARVEST campaign targets Iranian protest supporters with RAT malware

The key to Europe’s food security

OpenAI strengthens its push into India with Pine Labs fintech partnership

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CRESCENTHARVEST campaign targets Iranian protest supporters with RAT malware
Identity

CRESCENTHARVEST campaign targets Iranian protest supporters with RAT malware

userBy userFebruary 19, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 19, 2026Cyber ​​espionage/data security

Cybersecurity researchers have revealed details of a new campaign dubbed CRESCENTHARVEST, which likely targets supporters of ongoing protests in Iran, carrying out information theft and long-term espionage operations.

Acronis Threat Research Unit (TRU) announced that it had observed this activity since January 9th. The attack reportedly delivers a malicious payload that acts as a remote access Trojan (RAT) and information stealer, with the goal of executing commands, logging keystrokes, and exfiltrating sensitive data. It is currently unknown whether any of the attacks were successful.

“This campaign takes advantage of recent geopolitical developments to lure victims into opening malicious .LNK files disguised as protest-related images and videos,” researchers Subhajeet Sinha, Eliad Kimhi, and Darrell Virtusio said in a report released this week.

“These files are bundled with authentic media and Farsi-language reports that provide the latest information from ‘Iran’s rebellious cities.’ This support framework for the protests appears to be aimed at increasing credibility and attracting Farsi-speaking Iranians seeking information related to the protests.”

CRESCENTHARVEST is of unknown origin, but is believed to be the work of an Iranian-aligned threat group. The discovery marks the second campaign identified as targeting specific individuals in the aftermath of nationwide Iranian protests that began in late 2025.

Last month, French cybersecurity firm HarfangLab detailed a threat cluster called RedKitten that targeted non-governmental organizations and individuals involved in documenting recent human rights violations in Iran with the purpose of infecting them with a custom backdoor known as SloppyMIO.

According to Acronis, the exact initial access vector used to distribute the malware is unknown. However, threat actors are suspected to rely on spear phishing or “protracted social engineering efforts” in which operators take time to build relationships with victims before sending malicious payloads.

It’s worth noting that Iranian hacker groups like Charming Kitten and Tortoiseshell have a storied history of engaging in sophisticated social engineering attacks, using fake personas to approach potential targets and foster relationships, sometimes lasting years, before weaponizing trust and infecting them with malware.

“The use of Farsi-language content for social engineering and the distributed files depicting the protests in heroic terms suggest an intention to attract Iranian-Persian-speaking individuals to support the ongoing protests,” the Switzerland-based security firm said.

The starting point of the attack chain is a malicious RAR archive that claims to contain information related to the Iranian protests, including various images and videos, and two Windows Shortcuts (LNK) files that use double extension tricks (*.jpg.lnk or *.mp4.lnk) to disguise themselves as image or video files.

Once launched, this malicious file contains PowerShell code that retrieves another ZIP archive while simultaneously opening a benign image or video to trick victims into thinking they have manipulated a benign file.

Inside the ZIP archive are several DLL files containing a legitimate Google-signed binary (‘software_reporter_tool.exe’) shipped as part of Chrome’s cleanup utility and two malicious libraries that are sideloaded by the executable to accomplish the threat actor’s goals.

urtcbased140d_d.dll is a C++ implant that extracts and decrypts Chrome’s app-bound encryption keys through a COM interface. This overlaps with an open source project known as ChromElevator. version.dll (also known as CRESCENTHARVEST) is a remote access tool that lists installed antivirus products and security tools, enumerates local user accounts on the device, loads DLLs, and collects system metadata, browser credentials, Telegram desktop account data, and keystrokes.

CRESCENTHARVEST uses the Windows Win HTTP API to communicate with command and control (C2) servers (“Service Log Information”).[.]com”) to blend in with normal traffic. Some of the supported commands are listed below.

Anti, His to perform anti-analysis checks Dir, list directories Cwd, get current working directory Cd, change directory GetUser, get user information ps, run PowerShell commands (doesn’t work) KeyLog, activate keylogger Tel_s, steal Telegram session data Cook, steal browser cookies Info, steal system information F_log, steal browser credentials Upload, upload files Shell, run shell commands

“The CRESCENTHARVEST campaign represents the latest chapter in a decade-long pattern of suspected state-sponsored cyber espionage targeting journalists, activists, researchers, and diaspora communities around the world,” Acronis said. “Much of what we observed with CRESCENTHARVEST reflects established trade craft, including LNK-based initial access, sideloading of DLLs with signed binaries, credential harvesting, and social engineering tailored to current events.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe key to Europe’s food security
user
  • Website

Related Posts

Citizen Lab finds Cellebrite tool used on mobile phone of Kenyan activist in police custody

February 18, 2026

Grandstream GXP1600 VoIP phone exposed to unauthenticated remote code execution

February 18, 2026

Critical flaws found in four VS Code extensions with over 125 million installs

February 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CRESCENTHARVEST campaign targets Iranian protest supporters with RAT malware

The key to Europe’s food security

OpenAI strengthens its push into India with Pine Labs fintech partnership

Etsy sells used clothing marketplace Depop to eBay for $1.2 billion

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.