Sunday, May 18, 2025
Homecyber securityIranian Hackers Posing as Model Agency to Target Victims

Iranian Hackers Posing as Model Agency to Target Victims

Published on

SIEM as a Service

Follow Us on Google News

Unit 42, the threat intelligence arm of Palo Alto Networks, has exposed a covert operation likely orchestrated by Iranian cyber actors.

The campaign involves a fraudulent website, megamodelstudio[.]com, meticulously designed to impersonate the Hamburg-based Mega Model Agency.

Cyberespionage Campaign Uncovered

Registered on February 18, 2025, and hosted at IP address 64.72.205[.]32 since March 1, 2025, this deceptive site replicates the legitimate agency’s branding and content to lure unsuspecting visitors.

- Advertisement - Google News
Iranian Hackers
Fake Mega Model Agency website.

Beyond mere imitation, the site embeds malicious JavaScript code aimed at harvesting detailed visitor data, signaling a sophisticated social engineering and espionage effort.

With high confidence, Unit 42 attributes this activity to an Iranian threat group, potentially overlapping with Agent Serpens (also known as APT35 or Charming Kitten), a group notorious for targeting Iranian dissidents, journalists, and activists abroad.

Technical Intricacies of the Attack Mechanism

Delving into the technical underpinnings, the fake website executes obfuscated JavaScript upon a visitor’s arrival, capturing an array of identifiable information such as browser languages, screen resolutions, IP addresses via WebRTC leaks, and unique device fingerprints using canvas fingerprinting with SHA-256 hashing.

This data, structured in JSON format, is covertly transmitted to an endpoint labeled /ads/track via POST requests, masquerading as benign advertising traffic to evade detection.

Additionally, the site dynamically alters content to feature a fictitious model profile named “Shir Benzion,” replacing a real model’s details and embedding a currently inactive link to a private album.

This setup suggests preparation for targeted social engineering, potentially aiming to harvest credentials or deliver malware to specific victims.

While direct victim interaction has not yet been observed, the infrastructure hints at spear-phishing as a likely delivery mechanism, aligning with tactics historically associated with Agent Serpens.

The operation’s complexity underscores an evolving threat landscape, posing significant risks to individuals and organizations, particularly those connected to Iranian activist communities.

According to the Report, Unit 42 advises heightened vigilance, urging users to independently verify unsolicited contacts or appealing offers before engaging or sharing sensitive information.

For Palo Alto Networks customers, protections are fortified through Advanced URL Filtering, Advanced DNS Security, and Advanced Threat Prevention, which employ machine learning to detect and block malicious domains and exploits in real time.

Those suspecting compromise are encouraged to contact the Unit 42 Incident Response team for immediate assistance.

This campaign exemplifies the persistent and escalating nature of Iranian cyberespionage, leveraging detailed visitor profiling and impersonation tactics to target vulnerable populations with precision.

Indicators of Compromise (IoC)

IndicatorTypeDescription
megamodelstudio[.]comDomainDomain hosting the fake Mega Model Agency website
64.72.205[.]32IP AddressServer IP hosting the fraudulent website
hxxps://www.megamodelstudio[.]com/modelURLMain page of the fake website
hxxps://www.megamodelstudio[.]com/womenURLWomen’s page of the fake website
hxxps://www.megamodelstudio[.]com/women/Shir-BenzionURLFictitious “Shir Benzion” profile page

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...