Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CRESCENTHARVEST Malware Targets Iran Protesters

CRESCENTHARVEST Malware Targets Iran Protesters

Posted on February 18, 2026 By CWS

A new cyber threat campaign known as ‘CRESCENTHARVEST’ has emerged, exploiting the ongoing political unrest in Iran. This operation specifically targets individuals supporting or involved in protests, using advanced techniques to infiltrate and steal sensitive information.

How CRESCENTHARVEST Operates

The campaign utilizes social engineering methods to deploy malware that serves as both a remote access trojan (RAT) and an information stealer. Attackers strategically mimic legitimate protest-related content to gain the trust of their targets, thereby accessing sensitive systems.

The infection process starts with an archive containing seemingly authentic protest-related media. Victims encounter malicious .LNK files disguised as video or image files, which, when executed, deploy the malware payload while displaying decoy content to avoid detection.

Technical Sophistication of the Malware

Analysts from Acronis have discovered that the malware employs DLL sideloading, using a signed Google executable, software_reporter_tool.exe, to load harmful libraries. This technique allows attackers to capture keystrokes, execute commands, and exfiltrate critical data such as browser credentials and Telegram session files.

The primary goal of this campaign is long-term surveillance and intelligence gathering. It targets individuals sympathetic to the opposition, suggesting that the actors behind it may have state-level resources and objectives.

Evading Security Measures

A notable feature of CRESCENTHARVEST is its ability to bypass Chrome’s App-Bound Encryption. The malware uses a custom DLL to interact with the browser’s internal COM interfaces, requesting decryption services from the operating system to extract sensitive data.

This module locates the Local State file in the user’s AppData directory to extract encryption keys. By using the CoCreateInstance function, it tricks the system into decrypting these keys, allowing attackers to steal saved credentials, cookies, and browsing history.

To mitigate such risks, cybersecurity experts advise users to employ hardware security keys and exercise caution with unsolicited files. Organizations should also monitor unusual COM object activities and validate signed binaries to detect such evasion techniques.

Stay informed by following us on Google News, LinkedIn, and X for more updates. Set Cyber Security News as your preferred source in Google for real-time alerts.

Cyber Security News Tags:Acronis, App-Bound Encryption, Chrome encryption, CRESCENTHARVEST, cyberespionage, Cybersecurity, data theft, DLL Sideloading, information stealer, Iran protests, Malware, RAT, remote access trojan, security threats, social engineering

Post navigation

Previous Post: Dell RecoverPoint Exploited by Chinese Hackers
Next Post: Palo Alto Networks to Acquire Koi for Enhanced AI Security

Related Posts

Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild Cyber Security News
Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics Cyber Security News
HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks Cyber Security News
Streamlined Patch Management for Endpoint Device Security Streamlined Patch Management for Endpoint Device Security Cyber Security News
SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network Cyber Security News
Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Phishing Scam Targets Booking.com Users in Fraud Scheme
  • CISA Alerts on Exploited Vulnerability in TeamT5 Product
  • Critical Flaw in Popular VS Code Extension Exposes Developers
  • Notepad++ Secures Update Process Against Malware Threat
  • CISA Alerts on Active Exploitation of Google Chromium Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Phishing Scam Targets Booking.com Users in Fraud Scheme
  • CISA Alerts on Exploited Vulnerability in TeamT5 Product
  • Critical Flaw in Popular VS Code Extension Exposes Developers
  • Notepad++ Secures Update Process Against Malware Threat
  • CISA Alerts on Active Exploitation of Google Chromium Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News