Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets

Posted on November 14, 2025November 14, 2025 By CWS

The Iranian state-sponsored menace actor generally known as APT42 has been noticed concentrating on people and organizations which can be of curiosity to the Islamic Revolutionary Guard Corps (IRGC) as a part of a brand new espionage-focused marketing campaign.
The exercise, detected in early September 2025 and assessed to be ongoing, has been codenamed SpearSpecter by the Israel Nationwide Digital Company (INDA).
“The marketing campaign has systematically focused high-value senior protection and authorities officers utilizing personalised social engineering techniques,” INDA researchers Shimi Cohen, Adi Choose, Idan Beit-Yosef, Hila David, and Yaniv Goldman stated. “These embrace inviting targets to prestigious conferences or arranging important conferences.”
What’s notable in regards to the effort is that it additionally extends to the targets’ relations, making a broader assault floor that exerts extra stress on the first targets.
APT42 was first publicly documented in late 2022 by Google Mandiant, detailing its overlaps with one other IRGC menace cluster tracked as APT35, CALANQUE, Charming Kitten, CharmingCypress, Cobalt Phantasm, Educated Manticore, GreenCharlie, ITG18, Magic Hound, Mint Sandstorm (previously Phosphorus), TA453, and Yellow Garuda.

One of many group’s hallmarks is its potential to mount convincing social engineering campaigns that may run for days or perhaps weeks in an effort construct belief with the targets, in some circumstances masquerading as identified contacts to create an phantasm of authenticity, earlier than sending a malicious payload or tricking them into clicking on booby-trapped hyperlinks.
As not too long ago as June 2025, Test Level detailed an assault wave through which the menace actors approached Israeli know-how and cyber safety professionals by posing as know-how executives or researchers in emails and WhatsApp messages.
Goldman advised The Hacker Information that SpearSpecter and the June 2025 marketing campaign are distinct and have been undertaken by two totally different sub-groups inside APT42.
“Whereas our marketing campaign was carried out by cluster D of APT42 (which focuses extra on malware-based operations), the marketing campaign detailed by Test Level was carried out by cluster B of the identical group (which focuses extra on credential harvesting),” Goldman added.
INDA stated SpearSpecter is versatile in that the adversary tweaks its strategy primarily based on the worth of the goal and operational goals. In a single set of assaults, victims are redirected to bogus assembly pages which can be designed to seize their credentials. However, if the tip objective is persistent long-term entry, the assaults result in the deployment of a identified PowerShell backdoor dubbed TAMECAT that has been repeatedly put to make use of in recent times.

To that finish, the assault chains contain impersonating trusted WhatsApp contacts to ship a malicious hyperlink to a supposed required doc for an upcoming assembly or convention. When the hyperlink is clicked, it initiates a redirect chain to serve a WebDAV-hosted Home windows shortcut (LNK) masquerading as a PDF file by profiting from the “search-ms:” protocol handler.
The LNK file, for its half, establishes contact with a Cloudflare Employees subdomain to retrieve a batch script that features as a loader for TAMECAT, which, in flip, employs numerous modular elements to facilitate information exfiltration and distant management.

The PowerShell framework makes use of three distinct channels, viz., HTTPS, Discord, and Telegram, for command-and-control (C2), suggesting the menace actor’s objective of sustaining persistent entry to compromised hosts even when one pathway will get detected and blocked.
For Telegram-based C2, TAMECAT listens for incoming instructions from an attacker-controlled Telegram bot, primarily based on which it fetches and executes further PowerShell code from totally different Cloudflare Employees subdomains. Within the case of Discord, a webhook URL is used to ship fundamental system data and get instructions in return from a hard-coded channel.

“Evaluation of accounts recovered from the actor’s Discord server suggests the command lookup logic depends on messages from a selected consumer, permitting the actor to ship distinctive instructions to particular person contaminated hosts whereas utilizing the identical channel to coordinate a number of assaults, successfully making a collaborative workspace on a single infrastructure,” INDA researchers stated.
Moreover, TAMECAT comes outfitted with options to conduct reconnaissance, harvest information matching a sure extensions, steal information from internet browsers like Google Chrome and Microsoft Edge, acquire Outlook mailboxes, and take screenshots at 15-second intervals. The information is exfiltrated over HTTPS or FTP.
It additionally adopts a wide range of stealthy strategies to evade detection and resist evaluation efforts. These embrace encrypting telemetry and controller payloads, supply code obfuscation, utilizing living-off-the-land binaries (LOLBins) to cover malicious actions, and working principally in reminiscence, thereby leaving little traces on disk.
“The SpearSpecter marketing campaign’s infrastructure displays a classy mix of agility, stealth, and operational safety designed to maintain extended espionage towards high-value targets,” INDA stated. “operators leverage a multifaceted infrastructure that mixes respectable cloud providers with attacker-controlled sources, enabling seamless preliminary entry, persistent command-and-control (C2), and covert information exfiltration.”

The Hacker News Tags:Defense, Government, Hackers, Iranian, Launch, Operation, SpearSpecter, Spy, Targets

Post navigation

Previous Post: NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
Next Post: Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

Related Posts

Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam The Hacker News
Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams The Hacker News
Researchers Expose GhostCall and GhostHire: BlueNoroff’s New Malware Chains The Hacker News
BAS Is the Power Behind Real Defense The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News