14 June 2022

Suspected Iranian hackers targeted former Israeli officials, US ambassador


Suspected Iranian hackers targeted former Israeli officials, US ambassador

State-sponsored hackers believed to be working on behalf of the Iranian government have been running a high-profile spear-phishing operation targeting high-level officials in Israel, including former Foreign Minister and Deputy Prime Minister of Israel Tzipi Livni, an unnamed former Israeli military official and a former US ambassador to Israel.

As part of the operation, which has been active since at least December 2021, the hackers compromised existing accounts of the executives and created fake accounts to lure their targets into long email conversations, according to the Israeli cybersecurity firm Check Point Software Technologies. After exchanging several emails with the target, the attackers would include links to malicious documents or phishing pages.

The researchers believe that the goal of the operation was to collect personal information, passport scans, and access to email accounts.

Attackers targeted accounts by using common hacking techniques such as email phishing and social engineering, the researchers said.

Check Point did not attribute this campaign directly to any known threat actor, but said that based on some evidence the operation may be linked to the Iran-attributed Phosphorus APT group, a hackers group with a long history of conducting high-profile cyber operations, aligned with the interest of the Iranian regime, as well as targeting Israeli officials.

“The Iranian-affiliated Phosphorous APT group continues its spear-phishing activity against targets of the Iranian regime,” CheckPoint wrote in a report. “CPR researchers have solid evidence this operation dates back to December 2021 but could have started even earlier. The most sophisticated part of the operation is the social engineering. The attackers use real hijacked email chains, impersonations to well-known contacts of the targets and specific lures for each target. The operation implements a very targeted phishing chain that is specifically crafted for each target. In addition, the aggressive email engagement of the nation state attacker with the targets is rarely seen in the nation state cyber-attacks.”


Back to the list

Latest Posts

Cyber Security Week in Review: April 19, 2024

Cyber Security Week in Review: April 19, 2024

In brief: the LabHost PhaaS platform shut down, Russian military hackers attacked critical infrastructure in the US and Europe, and more.
19 April 2024
Ukrainian military personnel targeted via messaging apps and dating sites

Ukrainian military personnel targeted via messaging apps and dating sites

The threat actor employs a range of software in their malicious activities, including both commercial programs and  open-source tools.
18 April 2024
Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
18 April 2024