Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why is the built-in protection in modern data resilience not enough?

Iranian APT35 hacker targeting Israeli technical experts in AI-powered phishing attacks

What is working to reduce methane emissions in agriculture?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Iranian APT35 hacker targeting Israeli technical experts in AI-powered phishing attacks
Identity

Iranian APT35 hacker targeting Israeli technical experts in AI-powered phishing attacks

userBy userJune 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 26, 2025Ravi LakshmananCyber ​​Spy/Malware

AI-driven phishing attacks

The Iranian state-sponsored hacking group associated with the Islamic Revolutionary Security Force (IRGC) is linked to a spear phishing campaign targeting journalists, well-known cybersecurity experts and Israeli computer science professors.

“In some of these campaigns, Israeli technology and cybersecurity experts were approached by attackers who pretended to be fictitious assistants to technology executives or researchers through email and whatsapp messages,” Checkpoint said in a report released Wednesday. “The threat actor has been invited to the victims who have been invited to help out their Gmail login page.”

The cybersecurity company attributed it to activities to threat clusters that track APT35 (and its subcluster APT42), Kalank, Charming Kitten, Charming Cypress, Cobalt Illusion, ITG18, Magic Hound, Mint Sand Storm (formerly Lynpulse), Newscaster, TA453, and the Yellow Garda.

Cybersecurity

Advanced Persistent Threat (APT) groups have a long history of using elaborate lures to coordinate social engineering attacks, approaching targets on various platforms such as Facebook and LinkedIn, and using fictional personas to trick victims into deploying malware into systems.

According to Checkpoint, it was observed that after the Israeli war, a new wave of attacks that began in mid-June 2025 targeted Israeli people using fake meetings, either through targeted emails or WhatsApp messages. Messages are thought to be created using artificial intelligence (AI) tools.

One WhatsApp message flagged by the company has used current geopolitical tensions between the two countries to work together on victims, claiming that immediate support is needed on AI-based threat detection systems to combat surges of cyberattacks targeting Israel since June 12th.

Like what was observed in previous attractive kitten campaigns, the first message lacks malicious artifacts and is primarily designed to gain the trust of the target. Once the threat actor builds trust in the course of the conversation, the attack moves to the next phase by sharing a link directing the victim to a fake landing page where it can collect the qualifications of the Google account.

“Before sending a phishing link, threat actors will ask the victim for an email address,” Checkpoint said. “This address is pre-entered on the qualification phishing page to increase reliability and mimic the appearance of a legitimate Google authentication flow.”

“Custom fishing kit” […] It closely mimics familiar login pages like Google using modern web technologies such as React-based single-page applications (SPAs) and dynamic page routing. It also uses a real-time WebSocket connection to send stolen data and design allows you to hide your code from additional scrutiny. ”

Cybersecurity

Not only is the fake page part of a custom phishing kit that can capture credentials, it also captures two factor authentication (2FA) code to effectively promote 2FA relay attacks. The kit also includes a passive keylogger to record all keystrokes entered by the victim and remove them if the user abandons the process in the middle.

Some of the social engineering efforts include the use of the Google Sites domain, hosting Google Meet Pages with images that mimic legitimate meeting pages. Click anywhere in the image to instruct the victim on a phishing page that triggers the authentication process.

“Educated Manticore continues to pose a lasting and impactful threat to Israeli individuals, particularly during the escalation stage of the Israeli-Israel conflict,” Checkpoint said.

“The group continues to operate steadily, featuring aggressive spear phishing, rapid setup of domains, subdomains, infrastructure, and fast-paced takedowns when identified.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhat is working to reduce methane emissions in agriculture?
Next Article Why is the built-in protection in modern data resilience not enough?
user
  • Website

Related Posts

Why is the built-in protection in modern data resilience not enough?

June 26, 2025

Cybercriminals are leveraging open source tools to compromise on financial institutions in Africa

June 26, 2025

Cisa adds 3 flaws to the Kev catalog, affecting Ami Megarac, D-Link and Fortinet

June 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why is the built-in protection in modern data resilience not enough?

Iranian APT35 hacker targeting Israeli technical experts in AI-powered phishing attacks

What is working to reduce methane emissions in agriculture?

Cybercriminals are leveraging open source tools to compromise on financial institutions in Africa

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.