Tuesday, March 4, 2025
HomeComputer SecurityCharming Kitten APT Hackers Group Abusing Google Services to Attack U.S Presidential...

Charming Kitten APT Hackers Group Abusing Google Services to Attack U.S Presidential Campaign Members

Published on

SIEM as a Service

Follow Us on Google News

The Iranian based hacker group Charming Kitten, also known as APT35 or Ajax or Phosphorus is active since 2014. The hacker group primarily targets researchers from the US, Middle East, and France, focusing on Iranian academic researchers, Iranian dissidents in the US.

The group plays a vital role in democratic procedures, they attempt to intercept the elections in the US, Germany, and France.

Charming Kitten Attack Vector

The hacker group employes a spear-phishing method as the main attack vector, along with the phishing method the group attempts social media impersonation such as Facebook, Twitter, and Instagram for delivering malicious links. They also use SMS for delivering malicious links.

Pretending as Google Services

Threat actors use Google sites domain to trick the users in downloading the attachments, and they also collect the user’s Google account credentials. The email found to be sent from a no-reply email address.

ClearSky researchers observed multiple waves of a phishing campaign, one with a link to Google Drive and another set of emails from a colleague’s email. The Google drive link appears below.

hxxps://sites.google[.]com/view/cubqzpmuxra5bjxu7q2jxcxnhkldpa/drive/
hxxps://sites.google[.]com/screenshot-sharing-service/drive/

On clicking into the Google links, users are redirected to a shortened URL and directed to the malicious site. The malicious site poses as the entrance to Google services and tempts victims to enter login credentials.

SMS message as Attack Vector

Threat actors send SMS with a link embedded from the Sender ID ‘Live Recover’, the SMS asks to verify the victims with the attached link.

Login Attempt Alert

Attackers use to send fake login alerts, in one of the messages the victim receives a security alert for Yahoo, but the email was sent from Gmail.

Social Networks

Researchers found that Charming Kitten impersonates as a security team of social networks such as facebook, Twitter and Instagram.

“We have found an open directory at port 80 which contains files relevant for the deployment of different phishing sites. As seen from the picture, the first uploaded files were Facebook and Twitter impersonations.”

Recently Microsoft issued a serious warning that Iran state-sponsored hacking group Charming Kitten targets Government and private sector to compromise high profile email accounts.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the...

Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025″

Microsoft has announced the removal of the Data Encryption Standard (DES) encryption algorithm from...

Researchers Unveil APT28’s Advanced HTA Trojan Obfuscation Tactics

Security researchers have uncovered sophisticated obfuscation techniques employed by APT28, a Russian-linked advanced persistent...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the...

Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025″

Microsoft has announced the removal of the Data Encryption Standard (DES) encryption algorithm from...