A state-sponsored Iranian group has recently initiated targeted spear-phishing endeavors towards an influential Jewish leader, using a novel information-gathering software titled AnvilEcho.
Researchers from the cybersecurity company Proofpoint have been monitoring these activities led by TA453 which align with other aliases recognized by cybersecurity groups such as APT42, Charming Kitten, Damselfly, Mint Sandstorm, and Yellow Garuda.
According to a report by security analysts Joshua Miller, Georgi Mladenov, Andrew Northern, and Greg Lesnewich shared with The Hacker News, the attackers’ strategy involved enticing the target into benign conversation before distributing a malware toolkit named BlackSmith, which deploys the AnvilEcho PowerShell trojan.
The TA453 group is believed to have ties with Iran’s Islamic Revolutionary Guard Corps (IRGC), executing tailored phishing campaigns to serve the nation’s political and military objectives.
Recent data released by Mandiant, owned by Google, revealed that APT42’s primary targets are the U.S. and Israel, accounting for approximately 60% of the attacks, followed by Iran and the U.K.
These phishing campaigns are persistent and convincing, appearing as reputable figures and reporters to initiate dialogues with potential targets, gradually trapping them with malware-infested documents or deceitful credential-gathering pages.

These revelations come in the wake of HarfangLab disclosing a new Go-based malware (Cyclops) believed to be a successor to the Charming Kitten backdoor (BellaCiao). The malware was used to control targeted systems through reverse-tunneling a REST API to their command-and-control server.
The perpetrators potentially employed Cyclops to target a non-profit supporting innovation in Lebanon and a telecom company in Afghanistan, although the exact breach method remains unknown.
“Utilizing Go for the Cyclops malware has demonstrated the language’s growing popularity among malware creators. This sample’s low detection rate hints at the ongoing challenges for security software in countering Go programs,” mentioned HarfangLab.
“It’s possible that macOS and Linux variants of Cyclops exist, created from the same source code but yet to be identified.”
Found this article intriguing? Stay connected with us on Twitter ï‚™ and LinkedIn for more exclusive content.
