+92 310 8202561
ccienca@gmail.com

Iranian APT35 Hackers Target Israeli Tech Experts with AI-Powered Phishing Attacks

Iranian APT35 Phishing Attacks have been launched by a state-sponsored hacking group linked to the Islamic Revolutionary Guard Corps (IRGC). These Iranian APT35 Phishing Attacks are targeting Israeli technology professionals, cybersecurity experts, and journalists through AI-powered phishing campaigns and fake Google login pages.

Iranian APT35 Phishing Attacks: Targeting Israeli Cyber Experts

According to cybersecurity researchers from Check Point, the hackers specifically aimed their attacks at Israeli journalists, cybersecurity experts, and computer science professors. In this campaign, Iranian hackers posed as assistants to well-known technology executives or researchers. They contacted their targets via email and WhatsApp, sending fake meeting invitations or directing victims to counterfeit Google login pages designed to steal credentials.

These phishing attempts were carefully crafted to appear legitimate. The attackers used AI-powered writing tools to produce messages free of grammatical errors, increasing the chances of success.

Iranian APT35 Phishing Attacks Amid Geopolitical Tensions

One of the key techniques involved fake Google Meet invitations hosted on Google Sites. Victims clicking on these links were redirected to highly convincing phishing pages that closely mimicked real Google login pages.

The phishing kit used by APT35:

  • Captures Google login credentials and two-factor authentication (2FA) codes.

  • Uses real-time WebSocket connections to steal data instantly.

  • Employs passive keyloggers to record all keystrokes, even if victims abandon the login process.

Before sending phishing links, the attackers asked for the victim’s email address. This email was then pre-filled on the fake login page to increase credibility and trick the victim into believing it was a legitimate authentication process.

APT35 Hacker Group: Educated Manticore Operations

The latest wave of attacks began in mid-June 2025, coinciding with the escalation of the Iran-Israel war. The hackers exploited the conflict by creating urgent scenarios. For example, one phishing message claimed that Israel needed the victim’s immediate help to build an AI-powered cyber defense system.

These carefully designed lures made the attacks seem highly relevant and urgent, increasing the likelihood that victims would engage.

About the Attackers: APT35 and Educated Manticore

The threat cluster behind the campaign is tracked as Educated Manticore, which overlaps with groups such as:

  • APT35 (also known as Charming Kitten)

  • APT42

  • TA453

  • Mint Sandstorm (formerly Phosphorus)

These groups are known for:

  • Aggressive spear-phishing campaigns

  • Rapid creation of fake domains and infrastructure

  • Quick takedowns when exposed

Their expertise in social engineering and AI-driven phishing allows them to stay active and effective, even under constant cybersecurity scrutiny.

How to Stay Safe from Iranian APT35 Phishing Attacks: CCIE Academy Tips

Always Verify:

Double-check email senders, meeting invitations, and any request that asks for sensitive information.

Beware of AI-Powered Phishing:

Modern phishing attempts are polished, free of grammar mistakes, and often use urgent scenarios to trick you.

Protect Your Credentials:

Never enter your login details on suspicious websites or forms. Always verify URLs.

Stay Updated:

Keep learning about the latest cybersecurity threats and phishing tactics. Real-world awareness is key to strong defense.


About CCIE Academy

CCIE Academy is a leading training center offering expert-led courses in networking, cybersecurity, and IT certifications. We focus on practical labs, real-world scenarios, and current technologies to prepare our students for top-tier certifications such as CCNA, CCNP, and CCIE. Our mission is to create skilled, future-ready IT professionals capable of defending against modern cyber threats.

CCIE Academy