Cyber Midpoint – IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed

Since emerging in the mid-2010s as a persistent threat actor, the IRGC-linked APT35 collective has continually adapted its tactics to target government entities, energy firms, and diplomatic missions across the Middle East and beyond. Initially focused on credential harvesting via targeted phishing campaigns, the group has evolved a modular toolkit capable of deep network infiltration […]
Cyber Midpoint – IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed
Cyber Midpoint – IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed

Since emerging in the mid-2010s as a persistent threat actor, the IRGC-linked APT35 collective has continually adapted its tactics to target government entities, energy firms, and diplomatic missions across the Middle East and beyond. Initially focused on credential harvesting via targeted phishing campaigns, the group has evolved a modular toolkit capable of deep network infiltration […]

{}
Read more from Tushar Subhra Dutta

Billy Sneed
Author: Billy Sneed

Previous Article

Cyber Midpoint - Despite Rising Threats, Bosnia Yet to Establish Cyber Response Team

Next Article

Cyber Midpoint - CrowdStrike Falcon Bug Allows Code Execution and File Deletion

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *

Subscribe to our Newsletter

Subscribe to our email newsletter to get the latest posts delivered right to your email.
Pure inspiration, zero spam ✨