- Charming Kitten relies on deception rather than exploiting technical vulnerabilities in software
- Fake identities build trust before phishing attacks compromise users’ sensitive credentials
- The operations extend across the Apple and Microsoft platforms, affecting various users around the world.
Cyber operations linked to Iran are attracting renewed attention for relying less on advanced codes and more on human manipulation to gain access to sensitive systems.
At the center of this activity is Charming Kitten, a group associated with Iran’s security apparatus that has been targeting officials, researchers and corporate employees for years.
Instead of exploiting technical vulnerabilities, agents often pose as trusted contacts and use carefully crafted messages to trick victims into revealing their credentials or installing malicious software.
Article continues below.
Cold War tactics and social engineering
These tactics reflect intelligence strategies more commonly associated with Cold War espionage, where access and trust often proved more effective than technical superiority.
Fake online identities, including personas built around attractive or credible profiles, are used to establish relationships before launching phishing attacks.
This approach has allowed the group to operate on platforms used by the Apple and Microsoft ecosystems, exposing Mac and Windows users to compromises.
In addition to external deception campaigns, researchers have expressed concern about insider threats linked to individuals embedded in major technology companies.
A high-profile case involving members of the Ghandali family centers on allegations of theft of trade secrets from companies such as Google.
Prosecutors claim that sensitive data related to processor security and cryptography was extracted over time and transferred outside the United States.
Former counterintelligence officials describe the method as a “slow, deliberate extraction” carried out by actors with external training or direction.
Rather than relying on digital exfiltration tools, part of the alleged activity involved photographing computer screens, a low-tech method designed to avoid detection by cybersecurity systems.
“The most damaging breaches often originate from within,” one expert noted, adding that trusted access can bypass even advanced defenses.
Analysts maintain that these operations reflect a broader intelligence framework that combines cyber activity, human networks and surveillance capabilities.
Former officials say Iran has developed a layered approach that includes recruiting, online intelligence gathering and acquisition channels.
One source described Iran as “the third most sophisticated adversary” and added that its activities were underestimated for years compared to those of larger rivals.
The same networks have also been linked to tracking dissidents abroad, indicating that operations are not limited to economic or military targets.
This dual approach (external competence and internal control) complicates evaluations of intent and scale.
Cases like that of Monica Witt, who allegedly provided intelligence to Iran after defecting, reinforce concerns about domestic cooperation.
Staying safe from phishing and spying requires a layered approach to digital security. Users should verify their identities before sharing credentials or sensitive information.
Strong, unique passwords combined with multi-factor authentication help limit account risk.
Additionally, installing reliable antivirus software protects against known threats while maintaining an active firewall. prevents unauthorized access.
Additionally, reliable malware removal tools can detect and remove suspicious activity before it spreads.
via MSN
Follow TechRadar on Google News and add us as a preferred source to receive news, reviews and opinions from our experts in your feeds. Be sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp also.




