Iranian APT42 Deploys New SpearSpecter Spy Campaign

Related

CISOs to Watch in Massachusetts’ Insurance Industry

Massachusetts’ insurance sector includes regional carriers, global specialty insurers,...

CISOs to Watch in Massachusetts’ Financial Services Industry

Massachusetts’ financial services ecosystem blends global asset managers, insurers,...

Cybersecurity Leaders to Watch in Massachusetts’ Banking Industry

Massachusetts’ banking sector spans community banks, regional institutions, global...

Share

What happened

Iranian threat group APT42 launched a new espionage operation called SpearSpecter. The group used tailored social engineering to target senior officials and gained access through fake conference invitations. After a target clicked the link, the attackers installed a PowerShell backdoor and collected browser data, emails, and screenshots through cloud and messaging platforms.

Who is affected

The campaign focuses on senior defence and government officials. It also targets family members and close contacts, which increases the risk beyond corporate devices. Any organisation linked to government or defence work should consider this a relevant threat.

Why CISOs should care

The attackers rely on personalised messages, in-memory tools, and legitimate cloud services. These methods make detection harder and show that APT groups are expanding their reach by targeting people around high-value roles. This creates added risk for contractors, partners, and support teams who interact with sensitive government positions.

Three practical actions

  1. Strengthen training for executives and high-risk staff. Include scenarios involving external invitations and impersonation attempts.

  2. Improve endpoint monitoring for unusual PowerShell activity, in-memory tools, and traffic to platforms like Discord or Telegram.

  3. Review exposure from third parties and family-linked devices. Enforce least privilege and stronger identity checks for external requests.