Mysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel. "UNK_SmudgedSerpent leveraged domestic political lures, including societal change in Iran and investigation into the
AI Analysis
Technical Summary
UNK_SmudgedSerpent is a newly identified cyber espionage cluster active during mid-2025, targeting U.S.-based academics and foreign policy experts specializing in Iran-related matters amid heightened Iran–Israel tensions. The group employs sophisticated social engineering tactics, including impersonation of well-known U.S. think tank figures and use of domestic political lures related to Iranian societal changes and IRGC militarization. Initial contact is made via phishing emails that engage targets in benign conversations to build trust before attempting credential theft. The attackers use malicious URLs leading to credential harvesting pages mimicking Microsoft account login portals and OnlyOffice document hosting platforms. These pages are hosted on domains with health-related themes, a tactic previously observed in Iranian-linked TA455 operations. The infection chain includes delivery of MSI installers disguised as Microsoft Teams clients, which deploy legitimate Remote Monitoring and Management (RMM) software such as PDQ Connect and ISL Online. This dual-RMM deployment suggests hands-on-keyboard activity for persistent access or further lateral movement. The campaign's targeting of over 20 U.S. think tank experts and use of tailored phishing content indicates a focused espionage effort aligned with Iranian intelligence priorities. The operation reflects an evolution in Iranian cyber espionage, combining traditional phishing with legitimate tool abuse to evade detection and maintain stealth. No known exploits or widespread infections have been reported, but the campaign's sophistication and strategic targeting pose significant risks to confidentiality and operational integrity of affected individuals and organizations.
Potential Impact
For European organizations, especially those engaged in Middle East policy research, international relations, or academic collaboration with U.S. think tanks, this threat poses a significant risk to the confidentiality of sensitive information and intellectual property. Successful credential harvesting could lead to unauthorized access to email accounts, internal documents, and communication channels, potentially enabling espionage, data exfiltration, or further compromise. The use of legitimate RMM tools complicates detection and may facilitate persistent access or lateral movement within networks. Given the geopolitical context, compromised information could be used to influence policy decisions or diplomatic stances. Additionally, European entities collaborating on Iran-related research or hosting experts in this field might become secondary targets or collateral victims. The reputational damage and operational disruption from such espionage activities could be substantial, particularly for think tanks, universities, and governmental advisory bodies. The medium severity rating reflects the targeted nature and moderate ease of exploitation, but the potential impact on confidentiality and strategic information is high.
Mitigation Recommendations
European organizations should implement multi-layered email security solutions capable of detecting sophisticated phishing and impersonation attempts, including domain-based message authentication, reporting, and conformance (DMARC). User awareness training must emphasize recognizing social engineering tactics that involve benign engagement before credential requests. Deploy conditional access policies and multi-factor authentication (MFA) for all critical systems, especially email and collaboration platforms, to reduce the risk of credential compromise. Monitor network traffic and endpoint activity for unusual use of legitimate RMM tools like PDQ Connect and ISL Online, including unexpected installations or connections to suspicious domains. Employ threat hunting to identify signs of hands-on-keyboard activity and lateral movement. Establish strict controls and logging around software installation privileges. Collaborate with intelligence-sharing groups to stay informed about emerging tactics linked to Iranian cyber espionage. For organizations involved in Iran-related research, consider isolating sensitive environments and limiting external collaboration channels. Regularly review and update incident response plans to address targeted espionage scenarios. Finally, verify the authenticity of unexpected collaboration requests or document sharing, especially those involving external parties.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium
Mysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
Description
A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel. "UNK_SmudgedSerpent leveraged domestic political lures, including societal change in Iran and investigation into the
AI-Powered Analysis
Technical Analysis
UNK_SmudgedSerpent is a newly identified cyber espionage cluster active during mid-2025, targeting U.S.-based academics and foreign policy experts specializing in Iran-related matters amid heightened Iran–Israel tensions. The group employs sophisticated social engineering tactics, including impersonation of well-known U.S. think tank figures and use of domestic political lures related to Iranian societal changes and IRGC militarization. Initial contact is made via phishing emails that engage targets in benign conversations to build trust before attempting credential theft. The attackers use malicious URLs leading to credential harvesting pages mimicking Microsoft account login portals and OnlyOffice document hosting platforms. These pages are hosted on domains with health-related themes, a tactic previously observed in Iranian-linked TA455 operations. The infection chain includes delivery of MSI installers disguised as Microsoft Teams clients, which deploy legitimate Remote Monitoring and Management (RMM) software such as PDQ Connect and ISL Online. This dual-RMM deployment suggests hands-on-keyboard activity for persistent access or further lateral movement. The campaign's targeting of over 20 U.S. think tank experts and use of tailored phishing content indicates a focused espionage effort aligned with Iranian intelligence priorities. The operation reflects an evolution in Iranian cyber espionage, combining traditional phishing with legitimate tool abuse to evade detection and maintain stealth. No known exploits or widespread infections have been reported, but the campaign's sophistication and strategic targeting pose significant risks to confidentiality and operational integrity of affected individuals and organizations.
Potential Impact
For European organizations, especially those engaged in Middle East policy research, international relations, or academic collaboration with U.S. think tanks, this threat poses a significant risk to the confidentiality of sensitive information and intellectual property. Successful credential harvesting could lead to unauthorized access to email accounts, internal documents, and communication channels, potentially enabling espionage, data exfiltration, or further compromise. The use of legitimate RMM tools complicates detection and may facilitate persistent access or lateral movement within networks. Given the geopolitical context, compromised information could be used to influence policy decisions or diplomatic stances. Additionally, European entities collaborating on Iran-related research or hosting experts in this field might become secondary targets or collateral victims. The reputational damage and operational disruption from such espionage activities could be substantial, particularly for think tanks, universities, and governmental advisory bodies. The medium severity rating reflects the targeted nature and moderate ease of exploitation, but the potential impact on confidentiality and strategic information is high.
Mitigation Recommendations
European organizations should implement multi-layered email security solutions capable of detecting sophisticated phishing and impersonation attempts, including domain-based message authentication, reporting, and conformance (DMARC). User awareness training must emphasize recognizing social engineering tactics that involve benign engagement before credential requests. Deploy conditional access policies and multi-factor authentication (MFA) for all critical systems, especially email and collaboration platforms, to reduce the risk of credential compromise. Monitor network traffic and endpoint activity for unusual use of legitimate RMM tools like PDQ Connect and ISL Online, including unexpected installations or connections to suspicious domains. Employ threat hunting to identify signs of hands-on-keyboard activity and lateral movement. Establish strict controls and logging around software installation privileges. Collaborate with intelligence-sharing groups to stay informed about emerging tactics linked to Iranian cyber espionage. For organizations involved in Iran-related research, consider isolating sensitive environments and limiting external collaboration channels. Regularly review and update incident response plans to address targeted espionage scenarios. Finally, verify the authenticity of unexpected collaboration requests or document sharing, especially those involving external parties.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/11/mysterious-smudgedserpent-hackers.html","fetched":true,"fetchedAt":"2025-11-05T12:08:31.165Z","wordCount":1234}
Threat ID: 690b3e49eb4434bb4f89372d
Added to database: 11/5/2025, 12:08:41 PM
Last enriched: 11/5/2025, 12:09:07 PM
Last updated: 12/20/2025, 6:07:55 PM
Views: 124
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumCVE-2025-14734: CWE-352 Cross-Site Request Forgery (CSRF) in nestornoe Amazon affiliate lite Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.