Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Iranian APT35 hackers are oriented
Global Security

Iranian APT35 hackers are oriented

AdminBy AdminJune 26, 2025No Comments3 Mins Read
AI-Powered Phishing Attacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 26, 2025Red LakshmananCyber ​​-bue / malicious software

Phishing-on-ups with ah

The Iranian State Group related to the hacking group related to the Islamic Revolutionary Corps of the Guard (IRGC) was connected with the financial company aimed at journalists, high-profile cybersecurity experts and computer science faculty in Israel.

“In some of these companies Israeli technologies and cybersecurity experts have resorted to attackers who acted as fictitious assistants and e -mail researchers and WhatsApp reports,” Check Point – Note In a report published on Wednesday. “The actors threatened the victims who participated with them on fake entry pages in Gmail or Google correspond to invitations.”

Cybersecurity company attributed the activity with the cluster threat that it tracks as Formed manticthat crosses with APT35 (and its subclam APT42), Calanque, magical kitten, charmingcypress, cobalt illusion, itg18, Magic Hound, Mint Sandstorm (formerly phosphorus), Newscaster, Ta453 and yellow garden.

Cybersecurity

Group advanced permanent threat (APT) has long history of Archestration of social engineering attacks Using sophisticated baits, approaching purposes on different platforms such as Facebook and LinkedIn using fictitious characters to trick the victims in the deployment of malware in their systems.

Check Point said there is a new wave of attacks since mid -June 2025 after East of the Iran-Israel War This is aimed at Israeli who use fake monks for either e -mails or WhatsApp messages. Messages are believed to be designed with the help of artificial intelligence tools (AI).

One of the WhatsApp reports, indicated by the company, took advantage of the current geopolitical tensions between the two countries to persuade the victim to join the meeting, saying that they needed emergency assistance in the AI ​​threatening system to resist the overwhelm in Cyberats.

Initial messages, as well as those observed in previous magical kittens, are devoid of any malicious artifacts and is primarily designed to trust their goals. After the actors threaten the connection during the conversation, the attack goes to the next stage, sharing the links that direct the victims into fake targets capable of collecting their Google credits.

“Before sending a phishing milestone, the threatening subjects asked the victims of their email address,” the Check Point said. “Then this address is pre -filled on the Phisching Accounts page to increase the authority and mimic Google Authentication Stream.”

“User phishing supply (…) carefully imitates familiar entry pages, as in Google, using modern web technologies, such as one-page applications (SPA) and dynamic pages routing. It also uses real-time connections to send stolen data, and design.

Cybersecurity

The fake page is part of a custom phishing set that can not only capture their powers, but also two -factor authentication codes (2FA), effectively facilitating 2FA attacks. The kit also contains a passive key to record all the keys entered by the victim, and highlight them in case the user gives up the process in the middle.

Some social engineering efforts also provided for the use of Google Bogus site domains, which correspond to pages with an image that mimics the legitimate meeting page. By clicking on the picture, it directs the victim to the phishing pages that cause the authentication process.

“The educated Manticore continues to be a constant and great threat, especially for people in Israel during the Iran-Israel conflict,” said Check Point.

“The group continues to act steadily, characterized by an aggressive spear, rapid customization of domains, subdadons and infrastructure, and rapidly developing when identified. This agility allows them to remain effective when he enhanced control.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

June 26, 2025

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

June 26, 2025

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025

Noauth vulnerability by -still affects 9% Microsoft Entra Saas applications two years after opening

June 25, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new FileFix method is a threat

June 26, 2025

RCE Critical Disadvantages in Cisco ISE and ISE-PIC allow unauthorized attackers to access the roots

June 26, 2025

Why is built -in protection insufficient for modern data sustainability

June 26, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.