Iranian MOIS Phishing Campaign Targets Global Embassies and Ministries
Summary
Hide ▲
Show ▼
Iranian state hackers, identified as the Homeland Justice APT group, conducted a phishing campaign targeting over 50 embassies, ministries, and international organizations. The campaign, active from August 19, 2025, used compromised email accounts to send malicious documents containing VBA macros. The phishing emails were sent from legitimate, compromised accounts, increasing their credibility. The campaign appears to have concluded shortly after it began. The phishing emails were directed at diplomatic missions and international organizations worldwide, including the United Nations, the World Bank, and various humanitarian groups. The attackers used basic evasion techniques to conceal their activities and gather system information for potential follow-on attacks.
Timeline
-
04.09.2025 09:00 📰 1 articles · ⏱ 12d ago
Iranian MOIS Phishing Campaign Targets Global Embassies and Ministries
On August 19, 2025, Iranian state hackers, identified as the Homeland Justice APT group, launched a phishing campaign targeting over 50 embassies, ministries, and international organizations worldwide. The campaign used compromised email accounts to send malicious documents containing VBA macros. The phishing emails were sent from legitimate, compromised accounts, increasing their credibility. The campaign appears to have concluded shortly after it began, with the attackers' command-and-control infrastructure becoming inactive.
Show sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
Information Snippets
-
The phishing campaign began on August 19, 2025, and used compromised email accounts to send malicious documents.
First reported: 04.09.2025 09:00📰 1 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The campaign targeted over 50 embassies, ministries, and international organizations worldwide.
First reported: 04.09.2025 09:00📰 1 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The phishing emails were sent from legitimate, compromised accounts, increasing their credibility.
First reported: 04.09.2025 09:00📰 1 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The malicious documents contained VBA macros that, when enabled, executed a payload to gather system information.
First reported: 04.09.2025 09:00📰 1 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The campaign appears to have concluded shortly after it began, with the attackers' command-and-control infrastructure becoming inactive.
First reported: 04.09.2025 09:00📰 1 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The attackers used basic evasion techniques, including concealing the malware and delaying its execution.
First reported: 04.09.2025 09:00📰 1 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
Similar Happenings
FileFix Attack Using Steganography to Deploy StealC Infostealer
A new FileFix social engineering campaign impersonates Meta account suspension warnings to trick users into installing the StealC infostealer malware. The attack uses steganography to hide malicious scripts and executables within a JPG image. The campaign targets various credentials, cryptocurrency wallets, and cloud services. The FileFix technique abuses the File Explorer address bar to execute PowerShell commands, bypassing traditional detection methods. The attack was discovered by Acronis and observed over a two-week period, with multiple variants using different payloads and domains. The StealC malware aims to steal sensitive information from infected devices, including browser credentials, messaging app data, and cryptocurrency wallets. The FileFix technique was created by red team researcher mr.d0x and has been previously used by the Interlock ransomware gang. The attack uses a multilingual phishing site to trick users into copying and pasting a malicious command into the File Explorer address bar. The campaign abuses Bitbucket repositories to host malicious components, leveraging trust in the platform to bypass detection. The FileFix campaign is the most widespread, customized, and sophisticated to date, targeting users in over 16 countries. The phishing site has been translated into at least 16 different languages. The attack chain involves a phishing email impersonating Facebook security, warning users of account suspension. The attack uses AI-generated images in the steganography process. The FileFix technique is more elegant and less suspicious than ClickFix, using File Explorer instead of the Run dialog. The FileFix attack offers a broader range of high-value targets due to its use of File Explorer. Security researcher Eliad Kimhy predicts an increase in FileFix attacks in the near future.
Supply Chain Attack on npm Packages with Billions of Weekly Downloads
A supply chain attack compromised multiple npm packages with over 2.6 billion weekly downloads. Attackers injected malicious code into these packages after hijacking a maintainer's account via phishing. The malware targets web-based cryptocurrency transactions, redirecting them to attacker-controlled wallets. The attack was detected and mitigated by the NPM team, who removed the malicious versions within two hours. The phishing campaign targeted multiple maintainers, using a fake domain to trick them into updating their 2FA credentials. The malicious code operates by hooking into JavaScript functions and wallet APIs, intercepting and altering cryptocurrency transactions. The attack impacts users who installed the compromised packages during a specific time window and have vulnerable dependencies. The attack targeted Josh Junon, also known as Qix, who received a phishing email mimicking npm. The phishing email prompted the maintainer to enter their username, password, and 2FA token, which were stolen via an adversary-in-the-middle (AitM) attack. The attack affected 20 packages, including ansi-regex, chalk, debug, and others, with over 2 billion weekly downloads. The malware intercepts cryptocurrency transaction requests by computing the Levenshtein distance to swap the destination wallet address. The payload hooks into window.fetch, XMLHttpRequest, and window.ethereum.request, along with other wallet provider APIs. The attack also compromised another maintainer, duckdb_admin, to distribute the same wallet-drainer malware. The affected packages from the second maintainer include @coveops/abi, @duckdb/duckdb-wasm, and prebid, among others. The attack impacted roughly 10% of all cloud environments. The attackers diverted five cents worth of ETH and $20 worth of a virtually unknown memecoin. The attacker’s wallet addresses holding significant amounts have been flagged, limiting their ability to convert or use the funds.
Noisy Bear Phishing Campaign Against KazMunaiGas Identified as Planned Test
A phishing campaign targeting KazMunaiGas employees was initially attributed to the Noisy Bear threat actor. The campaign, codenamed Operation BarrelFire, involved phishing emails with malicious attachments. KazMunaiGas later clarified that the activity was part of a planned phishing test conducted in May 2025. The campaign used a ZIP file containing a Windows shortcut (LNK) downloader, a decoy document, and instructions in Russian and Kazakh. The LNK file dropped additional payloads, including a PowerShell loader and a DLL-based implant. The infrastructure was hosted on a Russia-based bulletproof hosting service. The campaign was initially reported in September 2025, with KazMunaiGas confirming it was a test in response to the report. The Noisy Bear threat actor has been active since at least April 2025, with the campaign involving sophisticated techniques such as anti-analysis measures and CreateRemoteThread Injection. The activity has geopolitical implications, potentially aiming to sustain information advantage in Central Asia.
Phishing campaign using SVG files to deploy Base64-encoded pages
A new malware campaign has been identified using Scalable Vector Graphics (SVG) files to deploy phishing pages. The SVG files, distributed via email, impersonate the Colombian judicial system and execute a JavaScript payload to inject a Base64-encoded HTML phishing page. This page mimics an official government document download process while downloading a ZIP archive in the background. The campaign has been active since at least August 14, 2025, and includes 523 unique SVG files that have evaded antivirus detection. The campaign is part of a broader trend where attackers are targeting macOS users with information stealers like Atomic macOS Stealer (AMOS). This stealer can exfiltrate a wide range of sensitive data, including credentials, browser data, and cryptocurrency wallets. The attackers use cracked software and ClickFix-style tactics to lure users into infecting their systems, bypassing macOS's Gatekeeper protections.
APT28 Exploits Microsoft Outlook with NotDoor Backdoor Malware
APT28, a Russian state-sponsored threat group, has been using a new backdoor malware called NotDoor to target Microsoft Outlook. NotDoor leverages Outlook as a covert communication, data exfiltration, and malware delivery channel. The malware is deployed via a legitimate signed binary, Microsoft's OneDrive.exe, which is vulnerable to DLL sideloading. The backdoor is triggered by specific strings in incoming emails, allowing attackers to execute commands, exfiltrate data, and upload files. NotDoor illustrates APT28's continued evolution in bypassing established defense mechanisms. The malware has been observed targeting multiple companies from different sectors in NATO member countries. NotDoor is designed as an obfuscated Visual Basic for Applications (VBA) project for Outlook that makes use of the Application.MAPILogonComplete and Application.NewMailEx events to run the payload every time Outlook is started or a new email arrives. The malware supports four different commands: cmd, cmdno, dwn, and upl. Files exfiltrated by the malware are saved in the folder, encoded using the malware's custom encryption, sent via email, and then deleted from the system. The attacks are notable for the abuse of Microsoft Dev Tunnels (devtunnels.ms) as C2 domains for added stealth. Attack chains entail the use of bogus Cloudflare Workers domains to distribute a Visual Basic Script like PteroLNK, which can propagate the infection to other machines by copying itself to connected USB drives, as well as download additional payloads.