New malware samples exfiltrate WhatsApp data to target Iran regime’s enemies
伊朗情报机构关联的黑客利用DCHSpy恶意软件新变种进行间谍活动,窃取WhatsApp数据、文件及设备信息,并通过Starlink相关诱饵传播恶意软件,目标为全球活动家和记者。 2025-7-21 15:31:20 Author: therecord.media(查看原文) 阅读量:13 收藏

Hackers believed to be affiliated with an Iranian intelligence agency are using a newly-discovered strain of the DCHSpy malware to snoop on adversaries.

Researchers from the cybersecurity firm Lookout detected the latest version of DCHSpy one week after Israel’s June bombing campaign targeting Iran’s nuclear program began. DCHSpy was first detected in 2024, but has since evolved and can now exfiltrate data from WhatsApp and files stored on devices, Lookout said.

The malware also collects contacts, SMS messages, location and call logs, and is able to use device cameras and microphones to take photos and record audio.

The new versions of the malware — which is believed to be tied to the Iranian cyber espionage group MuddyWater — rely on political lures and use websites containing links to malicious VPN and banking apps, Lookout says. One lure involved in the campaign centers on Starlink, which provided Iranians with web access after the country’s government imposed an internet blackout following Israel’s attacks.

MuddyWater, which is thought to be linked to Iran's Ministry of Intelligence and Security (MOIS), distributes the malware using fake URLs in Telegram and other messaging app channels, drawing targets into a prepared website hosting the malicious applications, according to the new research.

The lures are written in English and Farsi and focus on themes opposed by the Iranian regime. Many of the targets are activists and journalists worldwide.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/malware-exfiltrates-whatsapp-iran-muddywater
如有侵权请联系:admin#unsafe.sh