Since the start of Operation Epic Fury on February 28, 2026, Proofpoint researchers have observed heightened cyber activity against Middle East targets tied to the war. Our new blog shares examples of how the conflict in Iran is accelerating cyber espionage across the Middle East.

🔗: https://brnw.ch/21x0EJ8

Iran-aligned #TA453 ( #CharmingKitten #APT42 ) recently attempted credential phishing against a U.S. thinktank, continuing its longstanding intelligence collection efforts. At the same time, multiple state-sponsored actors, including groups suspected to be linked to China, Belarus, Pakistan, and Hamas, are targeting Middle Eastern government entities using conflict-themed lures, often sent from compromised government or diplomatic accounts.

This reflects both opportunistic social engineering and a broader shift in intelligence collection priorities driven by the conflict.

View the full blog to see campaign examples observed by our researchers. We will continue monitoring the landscape and keep our customers and community informed as the situation evolves.

SpearSpecter: APT42-linked IRGC operators are conducting a sophisticated cyberespionage campaign targeting senior defense + government officials.

The campaign relies heavily on personalized social engineering, WhatsApp outreach, and the TAMECAT modular PowerShell backdoor using Discord/Telegram C2.

Full analysis:
https://www.technadu.com/spearspecter-cyberespionage-campaign-linked-to-iranian-irgc-targets-high-value-officials/613793/

#APT42 #cyberespionage #IRGC #infosec #malwareanalysis #threatintel #technadu

GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools | Google Cloud Blog

Google Threat Intelligence Group's findings on adversarial misuse of AI, including Gemini and other non-Google tools.

Google Cloud Blog
APT42 impersonates cyber professionals to phish Israeli academics and journalists

Iran-linked APT42 targets Israeli experts with phishing attacks, posing as security professionals to steal email credentials and 2FA codes.

Security Affairs

"The office of Hannah Neumann, a member of the German Greens and head of the delegation spearheading work on European Union-Iran relations, was targeted by a hacking campaign that started in January, she said. Her staff was contacted with messages, phone calls and emails by hackers impersonating a legitimate contact. They eventually managed to target a laptop with malicious software.

"It was a very sophisticated attempt using various ways to manage that someone accidentally opens a link, including putting personal pressure on them," Neumann said.

Neumann was made aware of the ongoing ploy four weeks ago by the German domestic intelligence service, she said.

The group thought to be behind the attack is a hacking collective associated with the Iranian Revolutionary Guard, known as APT42, according to a report by the Parliament’s in-house IT service DG ITEC and seen by POLITICO. Another Iranian hacking group, called APT35 or Charming Kitten, was initially considered a culprit too. The two Iranian threat groups are closely related."

https://www.politico.eu/article/european-parliament-iran-delegation-chair-victim-tehran-linked-hacking-hannah-neumann/

#EU #Germany #Iran #CyberSecurity #StateHacking #Spyware #APT42 #APT35

European Parliament’s Iran delegation chair victim of Tehran-linked hacking

Hannah Neumann was targeted in a cyber-espionage operation by an infamous Iranian hacking group earlier this year, she said.

POLITICO
APT42, eine Hackereinheit, die sehr wahrscheinlich von den iranischen Revolutionsgarden gesteuert wird, attackiert die Abgeordnete des EU-Parlaments und Leiterin der Iran-Delegation des EP, Hannah Neumann. Das ist Spionage, aber auch der Versuch, einzuschüchtern. #apt42
https://www.zeit.de/2025/17/hannah-neumann-spionage-iran-hacker-europaeisches-parlament
Hannah Neumann : Wer attackiert diese Frau?

Mit Betroffenen staatlicher Überwachung zu sprechen, ist für die Europaabgeordnete Hannah Neumann Alltag. Dann wurde sie selbst ausspioniert. Die Spur führt in den Iran.

ZEIT ONLINE

New APT insight from Proofpoint ⬇️

This week, our team observed IRGC/Iraninan-aligned threat group #TA453 continue their phishing efforts despite the recent unsealing of indictments and sanctions by the U.S. government.

Specifically, Proofpoint observed TA453 masquerade as the Centre for Feminist Foreign Policy (CFFP) to target individuals associated with U.S. based universities, media companies, and politically adjacent social benefit organizations.

Today #CISA and the @FBI released a resource guide titled, “How to Protect Against Iranian Targeting of Accounts Associated with National Political Organizations.” It sets a good baseline on ways to protect against a variety of threat actors, including TA453. https://www.cisa.gov/resources-tools/resources/how-protect-against-iranian-targeting-accounts-associated-national-political-organizations

TA453 overlaps with reporting on #CharmingKitten, #MintSandstorm, #CharmingCypress and #APT42.

See our recent blog post to learn more about TA453’s malware evolution. https://ow.ly/OrXE50THoKZ

Social Engineering: Meta blockiert verdächtige WhatsApp-Konten​

Meta hat mehrere Konten blockiert, nachdem es mutmaßliche Cyberangriffe auf politische Akteure in den USA gegeben hat.​

heise online

The Iran-aligned threat actor who compromised the Trump campaign's email systems is known in the cybersecurity research community as #TA453, #APT42, or #CharmingKitten.

"The group's appearance in the U.S. election is noteworthy, sources told @Reuters, because of their invasive #espionage approach against high-value targets in Washington and Israel."

Read the article for insights from Joshua Miller of Proofpoint and other experts: https://www.reuters.com/world/trump-campaigns-iranian-hackers-have-dangerous-history-deep-expertise-2024-08-23/

The Iranians who hacked Trump's campaign have deep expertise

The Iranian hacking team that compromised the campaign of Republican presidential candidate Donald Trump is known for placing surveillance software on the mobile phones of its victims, enabling them to record calls, steal texts and silently turn on cameras and microphones, according to researchers and experts who follow the group.

Reuters
Google disrupted hacking campaigns carried out by Iran-linked APT42

Google disrupted a hacking campaign carried out by the Iran-linked APT group APT42 targeting the US presidential election.

Security Affairs