What happened?
- As part of the attacks, the attackers posed as policy experts of the Rasanah International Institute for Iranian Studies to build trust with their targets.
- The phishing emails invited the recipients to join a fake webinar by clicking on a link. Once the recipient clicked on the link, it caused the download of BASICSTAR onto their systems.
- In some cases, WhatsApp and Signal phone numbers under the control of attackers were also offered as alternative methods for contact.
Charming Kitten Uses BASICSTAR Against Middle East Policy Experts
Iranian-origin threat group Charming Kitten has launched an espionage campaign targeting Middle East policy experts using malware such as BASICSTAR and KORKULOADER, capable of executing remote commands and displaying decoy PDF files. Some phishing attacks dropped customized backdoors, POWERLESS for ... Read More
No comments:
Post a Comment