Israel Uncovers New Iranian Spy Methods Targeting Senior Officials
- Next News
- Nov 27, 2025
- 1 min read
The Israeli National Cyber Directorate has revealed an "unprecedented" Iranian cyber espionage campaign named "Spear Spectre," believed to be linked to the intelligence apparatus of Iran's Islamic Revolutionary Guard Corps (IRGC).

1. Shift in Attack Methodology
Perpetrators: The campaign is executed by a group known by names such as "APT 42" and "Charming Cypress."
Qualitative Change: This campaign represents a "clear shift from random attacks to precise espionage operations targeting specific individuals."
Espionage Goal: The goal is no longer just stealing passwords but achieving "continuous control over specific devices," according to the head of the cyber unit.
Primary Targets: High-ranking individuals in Israel's security, defense, and government sectors, in addition to members of their families.
2. "Build Trust Then Hack" Tactics
Building Relationships: Attackers spend days or weeks establishing seemingly professional or personal relationships with their targets to gain trust.
Lures: Tactics include sending invitations to alleged conferences or requests for high-level meetings.
Communication Platform: The "WhatsApp" application is used as the initial communication platform, leveraging its informal and familiar nature.
Attack Phases: The attack begins with intelligence gathering, then impersonating a trusted party and communicating via WhatsApp before sending the malicious link.
3. Advanced Hacking Tools
Lower-Sensitivity Targets: Fake meeting pages are used to directly steal passwords.
High-Level Targets: Attackers seek to plant advanced, hard-to-detect malware.
Hiding Traffic: The campaign relies on a distributed Command and Control (C2) structure through legitimate platforms like "Telegram" and "Discord" to conceal malicious data traffic amidst regular application usage.









Comments