Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

Posted on November 5, 2025November 5, 2025 By CWS

Nov 05, 2025Ravie LakshmananCybersecurity / Cyber Espionage
A never-before-seen menace exercise cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber assaults concentrating on teachers and international coverage consultants between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel.
“UNK_SmudgedSerpent leveraged home political lures, together with societal change in Iran and investigation into the militarization of the Islamic Revolutionary Guard Corps (IRGC),” Proofpoint safety researcher Saher Naumaan mentioned in a brand new report shared with The Hacker Information.
The enterprise safety firm mentioned the marketing campaign shares tactical similarities with that of prior assaults mounted by Iranian cyber espionage teams like TA455 (aka Smoke Sandstorm or UNC1549), TA453 (aka Mint Sandstorm or Charming Kitten), and TA450 (aka MuddyWater or Mango Sandstorm).

The e-mail messages bear all hallmarks of a traditional Charming Kitten assault, with the menace actors reeling in potential targets by partaking with them in benign conversations earlier than making an attempt to phish for his or her credentials.
In some instances, the emails have been discovered to comprise malicious URLs to trick victims into downloading an MSI installer that, whereas masquerading as Microsoft Groups, finally deploys reliable Distant Monitoring and Administration (RMM) software program like PDQ Join, a tactic usually embraced by MuddyWater.
Proofpoint mentioned the digital missives have additionally impersonated distinguished U.S. international coverage figures related to suppose tanks like Brookings Establishment and Washington Institute to lend them a veneer of legitimacy and improve the chance of success of the assault.

Targets of those efforts are over 20 material consultants of a U.S.-based suppose tank who deal with Iran-related coverage issues. In at the very least one case, the menace actor, upon receiving a response, is claimed to have insisted on verifying the id of the goal and the authenticity of the e-mail deal with earlier than continuing additional for any collaboration.
“I’m reaching out to substantiate whether or not a current e-mail expressing curiosity in our institute’s analysis mission was certainly despatched by you,” learn the e-mail. “The message was obtained from an deal with that doesn’t seem like your main e-mail, and I needed to make sure the authenticity earlier than continuing additional.”

Subsequently, the attackers despatched a hyperlink to sure paperwork that they claimed could be mentioned in an upcoming assembly. Clicking the hyperlink, nonetheless, takes the sufferer to a bogus touchdown web page that is designed to reap their Microsoft account credentials.
In one other variant of the an infection chain, the URL mimics a Microsoft Groups login web page together with a “Be part of now” button. Nonetheless, the follow-on phases activated after clicking the supposed assembly button are unclear at this stage.
Proofpoint famous that the adversary eliminated the password requirement on the credential harvesting web page after the goal “communicated suspicions,” as a substitute instantly taking them to a spoofed OnlyOffice login web page hosted on “thebesthomehealth[.]com.”
“UNK_SmudgedSerpent’s reference to OnlyOffice URLs and health-themed domains is paying homage to TA455 exercise,” Naumaan mentioned. “TA455 started registering health-related domains at the very least since October 2024 following a constant stream of domains with aerospace curiosity, with OnlyOffice changing into in style to host recordsdata extra just lately in June 2025.”

Hosted on the counterfeit OnlyOffice web site is a ZIP archive containing an MSI installer that, in flip, launches PDQ Join. The opposite paperwork, per the corporate, are assessed to be decoys.
There may be proof to recommend that UNK_SmudgedSerpent engaged in potential hands-on-keyboard exercise to put in extra RMM instruments like ISL On-line by means of PDQ Join. The explanation behind the sequential deployment of two distinct RMM applications just isn’t identified.
Different phishing emails despatched by the menace actor have focused a U.S.-based educational, looking for help in investigating the IRGC, in addition to one other particular person in early August 2025, soliciting a possible collaboration on researching “Iran’s Increasing Function in Latin America and U.S. Coverage Implications.”
“The campaigns align with Iran’s intelligence assortment, specializing in Western coverage evaluation, educational analysis, and strategic know-how,” Proofpoint mentioned. “The operation hints at evolving cooperation between Iranian intelligence entities and cyber models, marking a shift in Iran’s espionage ecosystem.”

The Hacker News Tags:Experts, Hackers, IranIsrael, Mysterious, Policy, SmudgedSerpent, Target, Tensions, U.S

Post navigation

Previous Post: Portal26 Raises $9 Million for Gen-AI Adoption Platform
Next Post: Nikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack

Related Posts

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar The Hacker News
Your Digital Footprint Can Lead Right to Your Front Door Your Digital Footprint Can Lead Right to Your Front Door The Hacker News
From Quantum Hacks to AI Defenses – Expert Guide to Building Unbreakable Cyber Resilience From Quantum Hacks to AI Defenses – Expert Guide to Building Unbreakable Cyber Resilience The Hacker News
Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover The Hacker News
GreedyBear Steals M in Crypto Using 150+ Malicious Firefox Wallet Extensions GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions The Hacker News
Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News