Automated purveyor of the finest cybersecurity produce available on the open web. We think you'll be pleasantly surprised.
Automated purveyor of the finest cybersecurity produce available on the open web. We think you'll be pleasantly surprised.
(proofpoint.com) State-Aligned Threat Actors Exploit Iran Conflict as Lure in Targeted Campaigns Against Middle Eastern Governments
Proofpoint identified six phishing and espionage campaigns targeting Middle Eastern government, diplomatic, and thinktank organizations, all leveraging the Iran conflict as lure content. The campaigns were attributed to actors linked to China (UNKInnerAmbush), Hamas (TA402), Pakistan (UNKRobotDreams), Belarus (TA473), Iran (TA453), and one unattributed group. Techniques ranged from DLL sideloading of Cobalt Strike and a Rust backdoor delivered via geofenced Azure infrastructure to OWA credential harvesting and multi stage rapport building phishing. Several campaigns used compromised government email accounts to increase credibility.
IOCs in the article.
Fediverse: Not known :-(