Iranian APT42 Deploys New SpearSpecter Spy Campaign

Related

Former Special Forces Leader’s Blackpanda Secures $22M to Expand Cyber Response Services

What happened Former special forces leader’s Blackpanda secures $22M to...

Nozomi Networks Opens APJ Headquarters Following $1B Industrial Security Growth

What happened Nozomi Networks opens APJ headquarters following $1B industrial...

Infoblox Bolsters External Threat Intelligence by Acquiring Axur

What happened Infoblox bolsters external threat intelligence by acquiring Axur...

CISOs to Watch in German Banking

Germany’s banking sector spans global universal banks, public and...

Share

What happened

Iranian threat group APT42 launched a new espionage operation called SpearSpecter. The group used tailored social engineering to target senior officials and gained access through fake conference invitations. After a target clicked the link, the attackers installed a PowerShell backdoor and collected browser data, emails, and screenshots through cloud and messaging platforms.

Who is affected

The campaign focuses on senior defence and government officials. It also targets family members and close contacts, which increases the risk beyond corporate devices. Any organisation linked to government or defence work should consider this a relevant threat.

Why CISOs should care

The attackers rely on personalised messages, in-memory tools, and legitimate cloud services. These methods make detection harder and show that APT groups are expanding their reach by targeting people around high-value roles. This creates added risk for contractors, partners, and support teams who interact with sensitive government positions.

Three practical actions

  1. Strengthen training for executives and high-risk staff. Include scenarios involving external invitations and impersonation attempts.

  2. Improve endpoint monitoring for unusual PowerShell activity, in-memory tools, and traffic to platforms like Discord or Telegram.

  3. Review exposure from third parties and family-linked devices. Enforce least privilege and stronger identity checks for external requests.