Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats

Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats

Posted on September 3, 2025September 3, 2025 By CWS

Sep 03, 2025Ravie LakshmananData Breach / Cyber Espionage
An Iran-nexus group has been linked to a “coordinated” and “multi-wave” spear-phishing marketing campaign concentrating on the embassies and consulates in Europe and different areas internationally.
The exercise has been attributed by Israeli cybersecurity firm Dream to Iranian-aligned operators linked to broader offensive cyber exercise undertaken by a gaggle referred to as Homeland Justice.
“Emails had been despatched to a number of authorities recipients worldwide, disguising legit diplomatic communication,” the corporate mentioned. “Proof factors towards a broader regional espionage effort aimed toward diplomatic and governmental entities throughout a time of heightened geopolitical stress.”

The assault chains contain the usage of spear-phishing emails with themes associated to geopolitical tensions between Iran and Israel to ship a malicious Microsoft Phrase that, when opened, urges recipients to “Allow Content material” with the intention to execute an embedded Visible Fundamental for Functions (VBA) macro, which is accountable for deploying the malware payload.
The e-mail messages, per Dream, had been despatched to embassies, consulates, and worldwide organizations throughout the Center East, Africa, Europe, Asia, and the Americas, suggesting that the exercise solid a large phishing web. European embassies and African organizations are mentioned to have been probably the most closely focused.

The digital missives had been despatched from 104 distinctive compromised addresses belonging to officers and pseudo-government entities to present them an additional layer of credibility. At the least among the emails originated from a hacked mailbox belonging to the Oman Ministry of International Affairs in Paris (*@fm.gov.om).
“The lure content material constantly referenced pressing MFA communications, conveyed authority, and exploited the widespread observe of enabling macros to entry content material, that are the hallmarks of a well-planned espionage operation that intentionally masked attribution,” Dream mentioned.
The tip objective of the assaults is to deploy utilizing the VBA macro an executable that may set up persistence, contact a command-and-control (C2) server, and harvest system info.

Cybersecurity firm ClearSky, which additionally detailed some elements of the marketing campaign late final month, mentioned the phishing emails had been despatched to a number of ministries of international affairs.
“Comparable obfuscation methods had been utilized by Iranian menace actors in 2023 after they focused Mojahedin-e-Khalq in Albania,” it mentioned in a submit on X. “We assess with reasonable confidence that this exercise is linked to the identical Iranian menace actors.”

The Hacker News Tags:Accounts, Diplomats, Email, Embassy, Exploit, Global, Hackers, Iranian, Phishing, Targeting

Post navigation

Previous Post: Chrome 140 Released With Fix For Six Vulnerabilities that Enable Remote Code Execution Attacks
Next Post: Google Patches 120 Flaws, Including Two Zero-Days Under Attack

Related Posts

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks The Hacker News
Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days The Hacker News
The Hype We Can Ignore (And the Risks We Can’t) The Hype We Can Ignore (And the Risks We Can’t) The Hacker News
XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities The Hacker News
North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress The Hacker News
Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark