Iranian Hackers Targeting Academics and Foreign Policy Experts

Iranian hacker groups have intensified their cyber espionage campaigns targeting academics and foreign policy experts worldwide. These threat actors employ sophisticated phishing techniques and malware to infiltrate the digital environments of universities, think tanks, and government agencies. Their primary objective is to steal sensitive information related to geopolitical strategies and international relations. The campaigns often leverage zero-day vulnerabilities and custom malware strains to evade detection and maintain persistent access. Organizations are urged to enhance their cybersecurity posture by implementing multi-factor authentication, conducting regular security awareness training, and deploying advanced threat detection systems. Collaboration between international cybersecurity communities and intelligence agencies is crucial to counter these persistent threats effectively. This article delves into the tactics, techniques, and procedures (TTPs) used by Iranian hackers, highlights notable incidents, and provides actionable recommendations for potential targets to safeguard their digital assets.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 06 Nov 2025 19:20:13 +0000


Cyber News related to Iranian Hackers Targeting Academics and Foreign Policy Experts

Beijing fosters foreign influencers to spread its propaganda The Register - China is offering foreign influencers access to its vast market in return for content that sings its praises and helps to spreads Beijing's desired narratives more widely around the world, according to think tank the Australian Strategic Policy ...
2 years ago Theregister.com
Microsoft: Iranian hackers target researchers with new MediaPl malware - Microsoft says that a group of Iranian-backed state hackers are targeting high-profile employees of research organizations and universities across Europe and the United States in spearphishing attacks pushing new backdoor malware. The attackers, a ...
1 year ago Bleepingcomputer.com APT3 APT33
Iranian Hackers Targeting Academics and Foreign Policy Experts - Iranian hacker groups have intensified their cyber espionage campaigns targeting academics and foreign policy experts worldwide. These threat actors employ sophisticated phishing techniques and malware to infiltrate the digital environments of ...
2 months ago Cybersecuritynews.com Iranian hacker groups
Check Point Research Report: Shift in Cyber Warfare Tactics - Highlights: Shift in Cyber Warfare Focus: Recent developments in cyber warfare reveal a shift in the activities of Iranian hacktivist proxies. Initially concentrated on Israel, these groups are now extending their cyber operations to include targets ...
2 years ago Blog.checkpoint.com
What Is a Firewall Policy? Ultimate Guide - A firewall policy is a set of rules and standards designed to control network traffic between an organization's internal network and the internet. There are key components to consider, main types of firewall policies and firewall configurations to be ...
2 years ago Esecurityplanet.com
Espionage costing Australia $8 billion each year, warns intelligence chief | The Record from Recorded Future News - Mike Burgess, who leads the Australian Security Intelligence Organisation, said at the Annual Hawke Lecture at the University of South Australia that he was putting a dollar figure on the economic cost of espionage for the first time to stress the ...
5 months ago Therecord.media Snatch
Cybercriminals expand targeting of Iranian bank customers with known mobile malware - Researchers have uncovered more than 200 fake mobile apps that mimic major Iranian banks to steal information from their customers. The campaign was first discovered in July of this year, but since then, the cybercriminals have expanded their ...
2 years ago Therecord.media
Cyberattack Targets Albanian Parliament's Data System, Halting Its Work - Albania's Parliament said on Tuesday that it had suffered a cyberattack with hackers trying to get into its data system, resulting in a temporary halt in its services. It said the system's services would resume at a later time. Local media reported ...
2 years ago Securityweek.com
How to create a cloud security policy, step by step - What's needed is a set of rules for how cloud security is managed, and the key to that is a cloud security policy. A cloud security policy contains detailed guidelines to help an organization ensure that it operates safely in the cloud. Because cloud ...
1 year ago Techtarget.com
CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure - The most concerning aspect of Iranian cyber operations involves their systematic targeting of operational technology networks and industrial control systems across multiple critical infrastructure sectors. When targeting operational technology ...
6 months ago Cybersecuritynews.com
Iran Ramps Up Cyberattacks on Israel Amid Hamas Conflict: Microsoft - In the context of the Israel-Hamas conflict, Iran's offensive operations against Israel were initially reactive and chaotic, but quickly ramped up and expanded in scope, Microsoft says. Immediately after October 7, Iranian threat actors were seen ...
1 year ago Securityweek.com
Iranian Threat Actors Leveraging AI-Crafted Emails to Target Cybersecurity Researchers and Academics - The campaign, primarily attributed to APT35 (also known as Charming Kitten and Magic Hound), represents a marked evolution in Iranian cyber warfare tactics, moving beyond traditional surveillance operations to more sophisticated, high-trust social ...
5 months ago Cybersecuritynews.com Magic Hound APT3
Chinese Hackers Target Iranian Government Entities in Months-long Attack - A months-long attack by Chinese hackers has been targeting Iranian government entities, according to a report by CSO Online. The hackers, named IAMPrime, have been targeting government institutions in Iran since at least July of last year. The ...
2 years ago Csoonline.com
US Authorities Identify Iranian Connection in Recent Cybersecurity Breaches - It has been announced that six Iranian officials have been sanctioned by the U.S. Department of Treasury's Office of Foreign Assets Control, the Iranian government organization responsible for the series of malicious cyber activities directed against ...
1 year ago Cysecurity.news
Experts from the United Nations Report North Korean Hackers Have Taken a Large Amount of Digital Assets - Last year, North Korean hackers working for the government stole a record-breaking amount of virtual assets estimated to be worth between $630 million and more than $1 billion, according to a new report from U.N. experts. The panel of experts said ...
2 years ago Securityweek.com Andariel Kimsuky Lazarus Group Rocke
Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors - This aggressive campaign has prompted urgent warnings from the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Department of Homeland Security, highlighting the critical need for enhanced security measures across industrial and ...
6 months ago Cybersecuritynews.com MuddyWater OilRig APT3 APT33
Iranian APT Phishes US Policy Wonks - An Iranian advanced persistent threat (APT) group has been actively targeting U.S. policy experts through sophisticated phishing campaigns. These attacks aim to infiltrate the networks of think tanks, government agencies, and policy research ...
2 months ago Darkreading.com Iranian APT
ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government - The hackers behind recent cyberattacks targeting industrial control systems at water facilities in the US are affiliated with the Iranian government, according to security agencies in the United States and Israel. The FBI, CISA, the NSA, the EPA and ...
2 years ago Securityweek.com
Hackers Sabotage Iranian Ships Using Maritime Communications - In a significant cyber-attack, hackers have successfully sabotaged Iranian ships by exploiting vulnerabilities in maritime communication systems. This incident highlights the growing threat of cyber warfare targeting critical maritime infrastructure. ...
4 months ago Cybersecuritynews.com
Create Highly Secure Applications in Mule 4 - Accessibility Control/Access Management Use Anypoint Access Management to create your Anypoint Platform account or configure a federated External Identity. Environment Management Anypoint Platform enables you to create and manage separate deployment ...
1 year ago Feeds.dzone.com
Breaches by Iran-Affiliated Hackers Spanned Multiple U.S. States, Federal Agencies Say - A small western Pennsylvania water authority was just one of multiple organizations breached in the United States by Iran-affiliated hackers who targeted a specific industrial control device because it is Israeli-made, U.S. and Israeli authorities ...
2 years ago Securityweek.com
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
2 years ago Hackread.com
Microsoft Breach - How Can I See This In BloodHound? - On January 25, 2024, Microsoft announced Russia's foreign intelligence service breached their corporate EntraID environment. We reviewed the information Microsoft's team provided in their post which contained details significant enough to explain ...
1 year ago Securityboulevard.com
The Unlikely Romance of Hackers and Government Suitors - The annual Hack the Capitol event brings together a diverse group of scientists, hackers, and policymakers to educate congressional staffers, scholars, and the press about the most critical cybersecurity challenges facing our nation. Hack the Capitol ...
2 years ago Darkreading.com
Iranian Hackers Targeting US Defense Industrial Base Entities With New Backdoor - Microsoft is raising the alarm on new Iranian state-sponsored attacks targeting employees at US defense industrial base organizations. The tech giant attributes the attacks to Peach Sandstorm, the name it uses to denominate the activity cluster also ...
2 years ago Securityweek.com APT3 APT33