Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»UNK_SmudgedSerpent Targets Academics With Political Lures
Cyber Security

UNK_SmudgedSerpent Targets Academics With Political Lures

Team-CWDBy Team-CWDNovember 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A previously unknown cyber actor targeting academics and foreign policy experts between June and August 2025 has been identified as UNK_SmudgedSerpent by cybersecurity researchers.

According to an advisory published by Proofpoint today, the group targeted individuals focused on Iran and global political developments, initiating contact through seemingly harmless conversations before attempting to steal credentials and deliver malware.

This activity combined techniques typically seen across multiple Iranian-linked threat groups, yet did not align cleanly with any single one. Proofpoint said the cluster shares traits with TA453, TA455 and TA450, but the overlaps are not strong enough for definitive attribution.

Multi-stage Lure and Delivery Chain

Investigators first observed an email discussing economic strains and unrest in Iran in June, sent to more than 20 think tank experts in the US.

After replies, attackers escalated the conversation and introduced spoofed collaboration materials via an OnlyOffice-styled link. The URL ultimately led to health-themed domains that collected credentials and delivered a ZIP file containing an MSI used to load remote monitoring and management (RMM) tools.

Those tools included PDQConnect and later ISL Online – a sequence researchers found unusual in nation-state operations. 

Read more on Iranian cyber operations: Iranian Hacking Group Nimbus Manticore Expands European Targeting

Early messages impersonated Brookings Institution vice president Suzanne Maloney, using a slightly misspelled Gmail account. Later waves spoofed policy expert Patrick Clawson, targeting an academic believed to be Israeli, then returning in August with lures tied to Iran’s activities in Latin America.

Key tactics used by UNK_SmudgedSerpent included:

  • Benign conversation starters

  • Think tank and policy-themed impersonation

  • OnlyOffice and Microsoft 365 spoofs

  • Health-related infrastructure

  • Deployment of RMM tools

Activity Paused but Concerns Persist

Though the group’s timing aligned with heightened Iran–Israel tensions, Proofpoint found no direct connection to those events.

Instead, researchers suggested possible explanations for the tactical overlap, ranging from shared infrastructure procurement to personnel movement between Iranian contracting outfits. The blending of lure styles, infrastructure and malware across known clusters further complicates attribution.

“The appearance of a new actor with borrowed techniques suggests there may be personnel mobility or exchange between teams, but with a consistent remit; however, there is no confirmed attribution for UNK_SmudgedSerpent at the time of writing,” Proofpoint said.

“The TTPs and infrastructure are an extension of previously observed behavior from Iranian threat groups, and the targeting of Iran foreign policy experts continues to reflect the Iranian government’s intelligence collection priorities.”

UNK_SmudgedSerpent activity stopped appearing in email telemetry in early August. Yet, infrastructure tied to the group later surfaced, hosting TA455-linked malware, indicating continued overlap and the possibility of ongoing operations.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe WhatsApp screen-sharing scam you didn’t see coming
Next Article Researchers Expose GhostCall and GhostHire: BlueNoroff’s New Malware Chains
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.