US, UK warn of Iran's Revolutionary Guard Corps using social engineering in cyberattacks

US, UK warn of Iran's Revolutionary Guard Corps using social engineering in cyberattacks

The UK’s National Cyber Security Centre (NCSC), in collaboration with US intelligence agencies, has issued a warning about ongoing cyber threats from actors working on behalf of Iran's Islamic Revolutionary Guard Corps (IRGC). The threat actors are leveraging social engineering techniques, such as spear-phishing, to gain access to the online accounts of individuals involved in Middle Eastern affairs, international politics, and human rights advocacy.

Targeting government officials, political activists, journalists, and think tank experts, the attackers have been impersonating trusted contacts via email or messaging platforms. By building rapport, they trick victims into clicking on malicious links that lead to fraudulent login pages designed to steal their account credentials.

Notably, these attackers may even attempt to bypass multi-factor authentication (MFA) by prompting victims to provide authentication codes through messaging platforms or phone notifications. In some cases, victims believe they are logging into their accounts while unknowingly giving attackers access.

Key indicators of compromise include:

  • Unauthorized logins from foreign IP addresses.

  • The creation of email forwarding rules to prevent victims from receiving notifications of suspicious activity.

  • The addition of unknown devices or accounts to the victim’s account.

  • Exfiltration and deletion of emails.

  • Attempts to gain access to additional victim accounts.

To prevent social engineering and spoofing attacks, the authoring agencies recommend several measures. Individuals should be wary of unsolicited contacts, especially if they claim to use new accounts or phone numbers, or request sharing files through unfamiliar channels. Suspicious emails containing odd details (like pixelated images, unusual language, or unfamiliar IP addresses) should be scrutinized. For enterprise protection, training on phishing awareness is advised, alongside security features like multi-factor authentication, anti-phishing mechanisms, and email monitoring for configuration changes. Email security frameworks and protocols, such as SPF, DKIM, and DMARC, should be implemented to prevent spoofing.

Back to the list

Latest Posts

Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

The organization says the decision to discontinue expiration emails is driven by rising operational costs, increasing privacy concerns, and efforts to simplify its infrastructure.
30 June 2025
UAC-0226 upgrades Giftedcrook malware for intelligence gathering on Ukraine

UAC-0226 upgrades Giftedcrook malware for intelligence gathering on Ukraine

V1.3 comes with expanded ability to exfiltrate a wide range of sensitive files.
30 June 2025
Crypto investment fraud ring dismantled in Spain after defrauding 5K victims worldwide

Crypto investment fraud ring dismantled in Spain after defrauding 5K victims worldwide

The Guardia Civil arrested five individuals who are believed to be key members of the international criminal network.
30 June 2025