SHARE
Facebook X Pinterest WhatsApp

Iranian Hackers Use SpearSpecter to Target Senior Government Leaders

An Iranian campaign called SpearSpecter is quietly targeting senior officials with tailored social engineering and fileless malware.

Written By
thumbnail
Ken Underhill
Ken Underhill
Nov 17, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A sophisticated Iranian cyber-espionage operation, known as SpearSpecter, is actively targeting senior government, military, and defense officials across the globe. 

The campaign is attributed to operators within Iran’s Islamic Revolutionary Guard Corps Intelligence Organization (IRGC-IO), an activity cluster also referred to as APT42 or CharmingCypress. 

Researchers from the Israel National Digital Agency (INDA) uncovered the ongoing operation and its associated malware tools, revealing a threat actor that blends patient social engineering with advanced technical capabilities to infiltrate high-value targets.

The Human Manipulation Behind the Campaign

SpearSpecter relies heavily on social engineering as its initial infiltration method. Attackers initiate contact through WhatsApp using persuasive pretexts such as fake conference invitations, meeting requests, or event participation. 

These communications often appear convincing because the operators invest weeks in rapport-building before delivering a malicious link. 

To widen their opportunities for compromise, APT42 has also been observed targeting victims’ family members, leveraging personal relationships to increase the likelihood of successful engagement.

How the Infection Chain Unfolds

Once sufficient trust is established, the victim receives a link to what appears to be an important document hosted on OneDrive. 

Clicking the link triggers exploitation of the Windows search-ms protocol, which prompts users to open Windows Explorer. If permitted, the system automatically connects to an attacker-controlled WebDAV server.

This WebDAV share presents a fake PDF file that is actually a malicious shortcut (LNK). When opened, it silently downloads and executes a batch script from Cloudflare Workers. 

This script loads TAMECAT, a modular PowerShell-based backdoor designed to operate exclusively in memory. 

TAMECAT communicates via multiple encrypted channels — including web traffic, Telegram, and Discord — and exfiltrates browser credentials, captures screenshots, enumerates documents, and uploads data in encrypted 5 MB segments. 

To maintain persistence, TAMECAT creates registry-based autoruns while blending into legitimate Windows processes to reduce detection.

A Persistent and Evolving Espionage Campaign

INDA’s investigation suggests that SpearSpecter has been active for months and shows no signs of slowing. 

The campaign’s reliance on fileless malware, legitimate cloud infrastructure, and personalized social engineering indicates a highly adaptive threat actor. 

These findings align with APT42’s known mission: long-term intelligence collection on individuals with access to sensitive or strategic information.

Key Defenses Against SpearSpecter Threats

Defending against the SpearSpecter campaign requires combining strong technical controls with heightened organizational awareness to counter APT42’s blend of social engineering, fileless malware, and trusted-service abuse.

  • Enable strong visibility and monitoring by using PowerShell script block logging, Sysmon with SIEM forwarding, robust EDR coverage, behavioral rules aligned to APT42 TTPs, and retroactive IOC hunts for high-risk environments.
  • Increase employee awareness by training staff on APT42’s realistic social engineering tactics and requiring verification of unexpected invitations, meeting requests, or document links through trusted internal contacts.
  • Disable the search-ms protocol by removing its registry keys to prevent remote file-browsing malware delivery and block this increasingly abused attack vector.
  • Improve network monitoring and filtering by establishing traffic baselines, alerting on deviations, and using proxies with packet inspection to detect suspicious patterns or connections to services like Telegram or Discord.
  • Harden endpoints by enabling PowerShell Constrained Language Mode, AMSI, and Script Block Logging, and restricting unapproved binaries, scripts, and LNK files using privilege management tools.

Together, these measures help organizations build cyber resilience to combat emerging threats.

The SpearSpecter campaign shows APT42’s ability to blend strategic social engineering with a sophisticated PowerShell-based malware toolkit to penetrate high-value targets. 

The operation’s evolving infrastructure, stealthy infection chain, and long-term espionage focus underscore its role in Iran’s broader intelligence apparatus.  

This level of stealth and persistence underscores the need for zero-trust principles that assume breach and verify every access path.

Recommended for you...

EchoGram: The Attack That Can Break AI Guardrails
Ken Underhill
Nov 17, 2025
ShadowMQ: Critical AI Flaws Impact Meta, NVIDIA, and More
Ken Underhill
Nov 17, 2025
The Human Perimeter: How the COM Became a Cybercrime Powerhouse
Ken Underhill
Nov 17, 2025
FortiWeb Flaw Actively Exploited to Create Rogue Admin Accounts
Ken Underhill
Nov 14, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.