Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CRESCENTHARVEST Campaign Targets Iranian Protest Allies

CRESCENTHARVEST Campaign Targets Iranian Protest Allies

Posted on February 19, 2026 By CWS

Cybersecurity experts have uncovered details about a new cyber espionage campaign named CRESCENTHARVEST that appears to target supporters of Iran’s recent protests. The Acronis Threat Research Unit (TRU) identified the operation post-January 9, highlighting its aim to deploy a remote access trojan (RAT) and information stealer for executing commands, logging keystrokes, and extracting sensitive data. The success of these attacks remains unclear.

Exploitation of Geopolitical Events

The campaign leverages current geopolitical tensions, enticing victims with malicious .LNK files disguised as protest-related media. Researchers Subhajeet Singha, Eliad Kimhy, and Darrel Virtusio reported that these files come bundled with genuine content and a Farsi-language report on Iran’s protest activities. This approach aims to enhance credibility among Farsi-speaking individuals seeking protest updates.

CRESCENTHARVEST’s origins are not explicitly known, but it is suspected to be linked to an Iran-aligned threat group. This revelation marks it as the second identified campaign targeting specific individuals following nationwide protests that started in late 2025. Previously, French cybersecurity firm HarfangLab detailed a related threat cluster, RedKitten, which targeted NGOs and individuals documenting human rights abuses in Iran, using a custom backdoor called SloppyMIO.

Social Engineering Tactics

The initial method of delivering the malware remains uncertain, though spear-phishing and prolonged social engineering efforts are suspected. Iranian hacking groups such as Charming Kitten and Tortoiseshell are known for sophisticated operations, building trust with targets over time before delivering malicious payloads.

The Swiss-based security company noted the use of Farsi language and protest-themed files as a strategy to attract and exploit Farsi-speaking individuals supportive of the protests. The attack begins with a deceptive RAR archive, claiming to contain protest-related data, including images and videos, alongside two Windows shortcut files masquerading as media files using the double extension trick.

Technical Aspects of the Attack

Once executed, the deceptive file uses PowerShell to download another ZIP archive while displaying a harmless image or video, misleading the victim. This ZIP archive contains a legitimate Google-signed binary and several DLL files, including two rogue libraries that are sideloaded to achieve the threat actor’s goals.

The CRESCENTHARVEST campaign employs Windows Win HTTP APIs for communication with its command-and-control server, blending with normal traffic. It supports various commands, such as anti-analysis checks, browser history theft, directory listing, keystroke logging, and more, highlighting its comprehensive capabilities.

Acronis stated that CRESCENTHARVEST continues a longstanding pattern of suspected state-sponsored cyber espionage targeting journalists, activists, researchers, and diaspora communities worldwide. Its tactics reflect well-established methods, including LNK-based access, DLL side-loading, credential harvesting, and event-aligned social engineering.

The Hacker News Tags:CRESCENTHARVEST, cyber attacks, cyber espionage, cyber threats, Cybersecurity, DLL side-loading, Farsi-speaking, information theft, Iran, Iran protests, Malware, RAT malware, remote access trojan, social engineering, threat groups

Post navigation

Previous Post: Microsoft Teams Mobile Update Prompts for Browser Choice
Next Post: Deutsche Bahn Faces Major DDoS Attack Disruption

Related Posts

RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities The Hacker News
APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More The Hacker News
Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks The Hacker News
Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack The Hacker News
OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups The Hacker News
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in API Keys Plugin Enables Account Takeovers
  • OpenClaw Faces Ongoing Security Challenges with New Open Source Tool
  • Android Malware Poses Threat to Mobile Banking Users
  • Microsoft Defender Boosts Threat Response with New Script Library
  • Crypto Mining Malware Targets Air-Gapped Systems via USB

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in API Keys Plugin Enables Account Takeovers
  • OpenClaw Faces Ongoing Security Challenges with New Open Source Tool
  • Android Malware Poses Threat to Mobile Banking Users
  • Microsoft Defender Boosts Threat Response with New Script Library
  • Crypto Mining Malware Targets Air-Gapped Systems via USB

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News