TA453 and TA473 Drive Iran War-Themed Phishing Across The Middle East

TA453 and TA473 Drive Iran War-Themed Phishing Across The Middle East
TA453 and TA473 Drive Iran War-Themed Phishing Across The Middle East
The conflict around Iran is now shaping cyber espionage across the region. Since the start of the war in late February 2026, security researchers have seen a rise in phishing campaigns using Iran-related lures to target government, diplomatic, and policy organizations in the Middle East and beyond.

The activity includes operations by known threat groups such as TA453 and TA473, as well as several newly tracked clusters.

Researchers say the campaigns show two clear trends. First, some actors are simply using the war as a timely topic to improve click rates.

War Lures Drive Multiple Phishing Operations

One of the most active new clusters used dramatic themes linked to the conflict, including false claims about Ayatollah Khamenei’s death and warnings that Israel might attack Gulf oil and gas infrastructure. These emails are linked to password-protected archives hosted on Google Drive.

Inside were LNK shortcut files disguised as JPG images. When opened, they launched a hidden loader that abused DLL sideloading to run a Cobalt Strike payload in memory.

UNK_InnerAmbush phishing email linking to archive hosted on Google Drive (Source: proofpoint)
UNK_InnerAmbush phishing email linking to archive hosted on Google Drive (Source: proofpoint)

Another campaign, tracked as TA402, used a compromised Iraqi government email account and an attacker-controlled Gmail address to target a Middle Eastern government entity. The messages referenced possible US military operations in Iran.

They included links that either displayed a fake document or a credential-harvesting page styled to look like Microsoft Outlook Web App, depending on the victim’s location.

TA402 Outlook Web App (OWA) phish hosted on iwsmailserver[.]com (Source: proofpoint)
TA402 Outlook Web App (OWA) phish hosted on iwsmailserver[.]com (Source: proofpoint)

TA453 and TA473 Expand The Threat Picture

Researchers also tracked TA473, also known as Winter Vivern, targeting government organizations in Europe and the Middle East. The group sent emails pretending to come from a spokesperson for the European Council President.

The attachment was an HTML file that displayed a decoy image and quietly sent HTTP requests containing the target’s email address, likely for tracking and engagement monitoring.

UNK_RobotDreams PDF attachment leading to executable hosted on defenceprodindia[.]site (Source: proofpoint)
UNK_RobotDreams PDF attachment leading to executable hosted on defenceprodindia[.]site (Source: proofpoint)

Meanwhile, TA453, an Iran-aligned espionage actor also known as APT42 or Charming Kitten, continued its usual intelligence-gathering activities during the war.

In one observed case, the group built rapport with a US think tank target through a believable email thread about a proofpoint roundtable on Middle East air defense.

Threat Actor Campaign Theme Associated IOC / Sender Payload / Malicious Domain
UNK_InnerAmbush Khamenei’s death / Gulf oil attack uzbembish@elcat[.]kg Photos from the scene.rar / Cobalt Strike
TA402 US ground operation / Gulf alliance ban.ali@mofa.gov[.]iq mail[.]iwsmailserver[.]com (OWA Phish)

The Iran conflict is not only driving military and diplomatic tension, but also creating powerful social engineering themes for cyber threat actors.

For defenders, the risk is growing because these messages mix real events, compromised government accounts, cloud services, and tailored credential theft pages to make phishing more convincing and harder to spot.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post TA453 and TA473 Drive Iran War-Themed Phishing Across The Middle East appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading