The Iranian-backed hacking group APT42 has stepped up its phishing campaigns against high-profile targets in Israel and the United States over the past six months. APT42, which is linked to Iran’s Islamic Revolutionary Guard Corps (IRGC), consistently targets current and former government officials, political campaigns, diplomats, and individuals working at think tanks and NGOs. Israel and the U.S. accounted for about 60% of APT42’s known geographic targeting between February and late July 2024.Iran, not Russia, is proving to be the biggest nation-state threat to the U.S. presidential election in November. https://t.co/sTfRDFzqit
— Mark Dubowitz (@mdubowitz) August 19, 2024
The group intensely targeted users in Israel, particularly in April, focusing on individuals connected to the Israeli military, defense sector, diplomats, academics, and NGOs. APT42 employs a range of tactics to carry out their campaigns, including hosting malware and phishing pages on services like Google Drive, Gmail, Dropbox, and OneDrive. Steps have been taken to disrupt their activities, such as resetting compromised accounts and adding malicious domains to the Safe Browsing blocklist.Check out this story from USA TODAY: Hackers from Iran and Russia compete to sink, boost Donald Trump
— Josh Meyer (@JoshMeyerDC) August 18, 2024
Iran has emerged as the first hostile nation to hack a presidential candidate whose campaign is being boosted by another US adversary, experts sayhttps://t.co/diAa2Xcliw
During the current U.S. presidential election cycle, APT42 has targeted personal email accounts of individuals affiliated with both President Biden and former President Trump, including government officials and campaign associates.“As hostilities between Iran and Israel intensify, we can expect to see increased campaigns there from APT42.”https://t.co/1OXBEUIUEn
— Lindsey O'Donnell Welch (@LindseyOD123) August 19, 2024