APT42 Attack: What is it & how does it target high-profile activists

It can use personal as well as corporate information for hacking.

Main Image
  • Like
  • Comment
  • Share

Iran government-supported hackers have recently targeted many high-profile activists, journalists, researchers, academics, diplomats, and politicians who have been working on Middle East issues. This credential phishing is being done via WhatsApp. The Human Rights Watch has linked this phishing attack with an entity affiliated with the Iranian government known as APT42. It is sometimes called TA453, Phosphorus, and Charming Kitten. This Iran-based hacking group was first identified by cybersecurity firm Mandiant in September 2022. Basically, Mandiant assesses with high confidence that APT42 is an Iranian state-sponsored cyber espionage group tasked with conducting information collection and surveillance operations against individuals and organizations of strategic interest to the Iranian government.

HRW has identified 18 victims who have been targeted as part of the same campaign, and 15 of these people have confirmed that they had received the same WhatsApp messages between September 15 and November 25.

According to the analysis by security firm Mandiant, APT42 uses highly targeted spear-phishing and social engineering techniques designed to build trust and rapport with victims to get their personal/corporate email accounts or to install Android malware on their smartphones. It uses Windows malware to boost credential harvesting and surveillance efforts.

Operations of APT42

There are 3 categories of operations-

Credential Harvesting- APT42 mostly targets corporate and personal email accounts through high-powered phishing campaigns with an emphasis on building trust and rapport with the target before attempting to steal the credentials. It also collects Multi-Factor Authentication codes to bypass authentication methods and uses compromised credentials to pursue access to the networks, devices, and accounts of employers, colleagues, and relatives of the initial victim.

Surveillance Operations- Till late 2015, a subset of APT’s 42 infrastructure served as command-and-control servers for Android mobile malware that aimed to track locations, monitor communications, and surveil the activities of individuals of interest to the Iranian government, including activists and dissidents inside Iran.

Malware deployment- While APT42 mostly prefers credential harvesting over activity on disk, it does rely on some lightweight tools and backdoor customs as well. These tools are included in the operations when the objectives extend beyond credential harvesting.

Over 30 confirmed targets by APT42 have been identified by Mandate. The total intrusions are higher based on the group’s high operational tempo, visibility gaps caused partly by group’s targeting of personal email accounts and partly by domestically focused efforts and extensive open source industry reporting on threat clusters associated with APT42.

Shivangi AgarwalShivangi Agarwal
Shivangi is a tech writer at Smartprix, where she covers consumer technology news with a focus on smartphones, wearables, laptops, and the evolving world of OTT streaming. Since joining the team in August 2021, she has written over 120 in-depth reviews, comparisons, and buying guides aimed at helping readers navigate the ever-changing tech landscape.

With a strong foundation in English literature and education, Shivangi brings clarity, insight, and a reader-first approach to every story. Her expertise lies in breaking down complex features into accessible, practical insights—whether she’s reviewing the latest smartphone or exploring trends in infotainment.

Shivangi holds a B.A. (Hons.) and M.A. in English, along with a B.Ed in English and Social Studies. She is based in Faridabad, India. You can follow her work on Smartprix or connect with her for tech-related queries.

Related Articles

ImageAmazon Prime Day 2025: Hand-Picked Deals On Refrigerators, Washing Machines, Smart TVs, and Vacuum Cleaners

The Amazon Prime Day 2025 sale is now live, offering deals and discounts on a wide range of home appliances. While I’ve already compiled lists of the best smartphones and audio products, this one focuses on the best deals on consumer durable items, including refrigerators, washing machines, smart TVs, and vacuum cleaners. If you’ve been …

ImageOver 1.3 million Clubhouse app users data leaked; How to secure your account

The data of Clubhouse users, an invitation-only social media app on iOS, have been leaked on a hacker forum for free. For the uninitiated, the Clubhouse app allows users to create a room of up to 5000 people for audio communication. It’s been reported that the SQL records of over 1.3 million Clubhouse users have …

ImageFacebook data of over 533 million users leaked for free on a hacker forum

Facebook data of over 533 million users have been reportedly leaked online on a hacker’s forum. The horrifying part is that the said data has been made openly available for free.  The revelation comes from a news report that the Facebook data breach involves information of users from 106 countries around the world and over …

ImageOnePlus Nord 5 Roundup: Snapdragon 8s Gen 3, 50MP Sony Primary Sensor, Expected Price, And Everything Else

The Chinese smartphone manufacturer OnePlus is gearing up to unveil the rightful successor of its successful Nord lineup: the Nord 5. It’s going to be an important handset for the brand, as it will target one of the highest-selling, mid-range segments of the Indian market, where competition is high. The OnePlus Nord 4 was one …

ImageSennheiser HD 505 Over-the-ear wired Headphones Launched in India

Sennheiser has officially introduced the HD 505 Copper Edition in India, targeting a wider audience for high-fidelity audio, whether you’re immersed in music playlists or engaged in gaming. Featuring a combination of superior tuning, extended comfort for long use, and a sleek minimalist design, the HD 505 serves as a straightforward entry point into the …

Discuss

Be the first to leave a comment.