Iranian Cyber Tricksters: APT42 Phishes Israeli Pros with Fake Security Personas

Iran-linked APT42 is fooling Israeli academics and journalists by impersonating cybersecurity professionals. They lure victims with polished messages, guiding them to fake Google login pages to swipe credentials and 2FA codes. It’s like phishing with a masters in digital deception!

Pro Dashboard

Hot Take:

In a plot twist that sounds like the start of a bad spy movie, APT42 is proving that imitation is not just the sincerest form of flattery but also a pretty handy way to steal your login details. Watch out, Israeli academics and journalists—those security professionals you’re chatting with might just be charming kittens in disguise.

Key Points:

  • APT42, an Iran-linked group, targets Israeli experts with phishing schemes.
  • The group uses polished, AI-written messages to build trust before launching attacks.
  • Custom phishing kits mimic Google login pages with React SPA technology.
  • Attackers leverage fake Google Meet invites to steal credentials.
  • The infrastructure includes over 130 phishing-related domains.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?