Skip to content
  Thursday 19 June 2025
Trending
July 25, 2023Rockwell Automation ThinManager ThinServer | CISA October 18, 2023Cybersecurity Analyst March 5, 2025<h3>Cloud Service Providers Hit by China’s Silk Typhoon Cyberattacks</h3> May 26, 2024Cybersecurity Engineer (Mainframe RACF) July 15, 2024Principal Cybersecurity CyberArk Architect October 6, 2024Sr. Cybersecurity Specialist (Threat Modeling) November 2, 2024<h3>Doctor Slapped with $500K HIPAA Fine: Feds Outdo Hackers!</h3> November 4, 2023Cybersecurity Architect February 10, 2025Cybersecurity Analyst March 21, 2023Siemens RUGGEDCOM APE1808 Product Family
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Advanced Cyber Attacks Used by Charming Kitten to Target Iranian Dissidents
Industry News

Advanced Cyber Attacks Used by Charming Kitten to Target Iranian Dissidents

Mister CybersecurityMister Cybersecurity—August 14, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Salesforce Broadens Einstein AI and Data Cloud Platform

September 12, 2023

Cybersecurity Specialties with the Highest Pay: A Breakdown

March 7, 2024

Revolutionize Your Security with Elisity’s Microsegmentation for Every User, Workload, and Device

January 10, 2025

UK ICO Slaps £750,000 Fine on Police Service Northern Ireland

October 3, 2024



Germany’s Federal Office for the Protection of the Constitution (BfV) has issued a warning about cyber assaults focusing on Iranian people and organizations within the nation. The assaults are primarily geared toward dissident organizations and people, comparable to attorneys, journalists, and human rights activists. The menace actor behind the assaults is called Charming Kitten, or APT35, Mint Sandstorm, TA453, and Yellow Garuda.

Charming Kitten has a historical past of utilizing social engineering and fictitious on-line identities to goal its victims. The group impersonates journalists and NGO workers to construct belief with their targets. They ship hyperlinks to an internet video chat that prompts victims to enter their login info on a phishing web page, leading to credential theft. The phishing pages imitate reputable on-line service suppliers like Google or Microsoft.

The assaults additionally align with earlier findings from Certfa Lab and Human Rights Watch, which found a credential phishing marketing campaign focusing on human rights activists, journalists, researchers, diplomats, and politicians within the Middle East. Additionally, Sophos just lately revealed a cellular malware marketing campaign focusing on Iranian banks, utilizing pretend Android apps to steal delicate info comparable to web banking login credentials and bank card particulars.

These cyber assaults spotlight the continued development of Iranian nation-state actors when it comes to their instruments and methods. While they might not be as refined as Russian or Chinese actors, they’ve developed customized malware and exploit n-day safety flaws to acquire entry to techniques. The assaults additionally reveal the significance of vigilance and cybersecurity measures, particularly for people and organizations that could be focused for his or her dissident actions or advocacy work.



Source hyperlink

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Identity Fabric Frays: Unveiling Rips in Your Identity
Continuous Xurum Attacks Targeting E-commerce Websites through Severe Magento 2 Vulnerability
Related posts
  • Related posts
  • More from author
Industry News

World Leaks Uncovers Massive Data Breach at State Contractor!

June 19, 20250
Industry News

Iran Cuts Internet Amid Rising Tensions

June 18, 20250
Industry News

Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

June 18, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

World Leaks Uncovers Massive Data Breach at State Contractor!

June 19, 20250
Industry News

Iran Cuts Internet Amid Rising Tensions

June 18, 20250
Industry News

Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

June 18, 20250
Industry News

WormGPT Clones Hijack Popular AI Models to Thrive

June 18, 20250
Industry News

MiniMax M1 Challenges AI Titans with Unbeatable Cost and Performance

June 18, 20250
Industry News

23andMe Hit with £2.31 Million Fine by ICO

June 18, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • World Leaks Uncovers Massive Data Breach at State Contractor!

  • Iran Cuts Internet Amid Rising Tensions

  • Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

  • WormGPT Clones Hijack Popular AI Models to Thrive

  • MiniMax M1 Challenges AI Titans with Unbeatable Cost and Performance

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures