{"id":52586,"date":"2023-06-30T17:53:00","date_gmt":"2023-06-30T17:53:00","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-global\/iran-linked-apt35-israeli-media-upgraded-spear-phishing"},"modified":"2023-06-30T17:53:00","modified_gmt":"2023-06-30T17:53:00","slug":"iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/","title":{"rendered":"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b90a77790e45798\/649ed77327603d0f618c5cbf\/iranian_flag_Birgit_Korber_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The&nbsp;Iran-linked threat&nbsp;group known as&nbsp;APT35 (aka Charming Kitten, Imperial Kitten, or Tortoiseshell)&nbsp;has updated its cyberattack arsenal with improved abilities to hide its actions, as well as&nbsp;an upgraded custom&nbsp;backdoor that it&#8217;s distributing&nbsp;via a spear-phishing campaign.<\/p>\n<p>The advanced persistent threat (APT)&nbsp;has been alleged to be operating out of Iran and primarily concerned with collecting intelligence by compromising account credentials and, subsequently, the email of individuals they successfully spear-phish.<\/p>\n<p>According to a <a href=\"https:\/\/www.volexity.com\/blog\/2023\/06\/28\/charming-kitten-updates-powerstar-with-an-interplanetary-twist\/\" target=\"_blank\" rel=\"noopener\">blog post published by Volexity<\/a>, the group has recently attempted a spear-phishing campaign targeting an Israeli journalist with a &#8220;draft report&#8221; lure. The &#8220;draft report&#8221; was a password-protected RAR file containing a malicious LNK file which downloaded a backdoor.<\/p>\n<p>The incident was a highly targeted attack; prior to sending malware to the victim, the attackers asked if the person would be open to reviewing a document they had written related to US foreign policy. The target agreed to do so, since this is not an unusual request in the journalism line of work, but APT35 didn&#8217;t send it right away \u2014 instead, the attackers continued the interaction with another benign email containing a list of questions, to which the target then responded with answers. After multiple days of benign and seemingly legitimate interaction, the attackers finally sent the &#8220;draft report&#8221; loaded with malware.<\/p>\n<p>Toby Lewis, global head of threat analysis at Darktrace, says APT35&#8217;s targeting profile is very much in the theme of what you&#8217;d expect to see from a group associated to the Iranian government. He says: &#8220;This is a group that&#8217;s trying to be bespoke, be stealthy, and stay under the radar, and so to do that you&#8217;re also going to really focus your social engineering to try and improve that return on the investment.&#8221;<\/p>\n<h2 class=\"regular-text\">PowerStar Malware &amp; Evolving&nbsp;Spear-Phishing Techniques<\/h2>\n<p>In this most recent campaign, it delivered the&nbsp;PowerStar malware \u2014 an updated version of one of its known backdoors, known as <a href=\"https:\/\/research.checkpoint.com\/2022\/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit\/\" target=\"_blank\" rel=\"noopener\">CharmPower<\/a> \u2014 which it sent via an email containing an .LNK file inside a password-protected .RAR file.<\/p>\n<p>When executed by a user, the .LNK file downloads PowerStar from the Backblaze hosting provider and attacker-controlled infrastructure, according to Volexity&#8217;s report. PowerStar then collects a small amount of system information from the compromised machine and sends it via a POST request to a command-and-control (C2) address downloaded from Backblaze.<\/p>\n<p>Volexity believes this variant of PowerStar to be especially complex, and suspects that it is likely supported by a custom server-side component, which automates simple actions for the malware operator. Also, a decryption function is downloaded from remotely hosted files which hinders detection of the malware outside of memory and gives the attacker a kill switch to prevent future analysis of the malware&#8217;s key functionality.<br \/>&#8220;With PowerStar, Charming Kitten sought to limit the risk of exposing their malware to analysis and detection by delivering the decryption method separately from the initial code and never writing it to disk,&#8221; the company said. &#8220;This has the added bonus of acting as an operational guardrail, as decoupling the decryption method from its command-and-control server prevents future successful decryption of the corresponding PowerStar payload.&#8221;<\/p>\n<p>Lewis says that quest for return on investment for APT groups sometimes drives relatively unsophisticated, low-effort campaigns, but more often, &#8220;you&#8217;ve got groups that are going to get as sophisticated as they need to be to meet their objectives.&#8221; What that means can run the gamut: Some will be able to develop zero days, as opposed to just using something they got from somebody else; others will demonstrate sophistication in how they manage and control their infrastructure.<\/p>\n<p>The latter is the case with APT35.&nbsp;&#8220;When you&#8217;ve got the trade craft that we&#8217;ve got this group using, effectively bringing down custom payloads, it&#8217;s bringing down different modules from third party services,&#8221; he says. &#8220;Each different payload is going to be a little bit different, a little bit tweaked, and a little bit tuned, and &#8230; that sort of approach is absolutely what you&#8217;d expect to see.&#8221;<\/p>\n<p>Nonetheless, Volexity researchers said they regularly observe operations from the APT, but finds the group to rarely deploy malware as part of their attacks. &#8220;This sparing use of malware in their operations likely increases the difficulty of tracking their attacks,&#8221; according to the firm.<\/p>\n<p>APT35 has been active for more than a decade. According to a <a href=\"https:\/\/darktrace.com\/blog\/apt35-charming-kitten-discovered-in-a-pre-infected-environment\" target=\"_blank\" rel=\"noopener\">2021 blog<\/a> from Darktrace, APT35 has in that time&nbsp;launched extensive campaigns against organizations and officials across North America and the Middle East; public attribution has characterized APT35 as an&nbsp;<a href=\"https:\/\/www.cfr.org\/cyber-operations\/apt-35\" target=\"_blank\" rel=\"noopener\">Iran-based<\/a>&nbsp;nation state threat actor. Recent campaigns were suspected to be in service to<a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/iran-backed-charming-kitten-apt-eyes-kinetic-ops-kidnapping\" target=\"_blank\" rel=\"noopener\"> Iran&#8217;s potential physical targeting of dissenters for kidnapping <\/a>and other kinetic ops.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-global\/iran-linked-apt35-israeli-media-upgraded-spear-phishing\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The APT35 group (aka Charming Kitten), have added backdoor capabilities to their spear-phishing payloads \u2014 and targeted an Israeli reporter with it.Read More <a href=\"https:\/\/www.darkreading.com\/dr-global\/iran-linked-apt35-israeli-media-upgraded-spear-phishing\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-52586","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-30T17:53:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b90a77790e45798\/649ed77327603d0f618c5cbf\/iranian_flag_Birgit_Korber_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools\",\"datePublished\":\"2023-06-30T17:53:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/\"},\"wordCount\":810,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7b90a77790e45798\\\/649ed77327603d0f618c5cbf\\\/iranian_flag_Birgit_Korber_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/\",\"name\":\"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7b90a77790e45798\\\/649ed77327603d0f618c5cbf\\\/iranian_flag_Birgit_Korber_Alamy.jpg\",\"datePublished\":\"2023-06-30T17:53:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7b90a77790e45798\\\/649ed77327603d0f618c5cbf\\\/iranian_flag_Birgit_Korber_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt7b90a77790e45798\\\/649ed77327603d0f618c5cbf\\\/iranian_flag_Birgit_Korber_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/","og_locale":"en_US","og_type":"article","og_title":"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-30T17:53:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b90a77790e45798\/649ed77327603d0f618c5cbf\/iranian_flag_Birgit_Korber_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools","datePublished":"2023-06-30T17:53:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/"},"wordCount":810,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b90a77790e45798\/649ed77327603d0f618c5cbf\/iranian_flag_Birgit_Korber_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/","url":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/","name":"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b90a77790e45798\/649ed77327603d0f618c5cbf\/iranian_flag_Birgit_Korber_Alamy.jpg","datePublished":"2023-06-30T17:53:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b90a77790e45798\/649ed77327603d0f618c5cbf\/iranian_flag_Birgit_Korber_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt7b90a77790e45798\/649ed77327603d0f618c5cbf\/iranian_flag_Birgit_Korber_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/iran-linked-apt35-targets-israeli-media-with-upgraded-spear-phishing-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52586"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52586\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}