Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Smudged Serpent Targets US Experts

November 5, 2025
Reading Time: 3 mins read
in Alerts
Microsoft Edge Adds Scareware Sensor

A sophisticated, previously unobserved cyber threat actor, which researchers have designated UNK_SmudgedSerpent, has been tied to a series of targeted attacks against academics and foreign policy experts. These incursions took place over the summer months, specifically between June and August 2025, a timeframe that directly overlapped with escalated geopolitical tensions between the nations of Iran and Israel. This timing suggests a highly motivated and contextually aware operation, focusing on individuals likely possessing sensitive knowledge or influence in this volatile region.

The core strategy of UNK_SmudgedSerpent involved leveraging highly specific and emotionally charged domestic political issues to ensnare their targets. According to a new report from security firm Proofpoint, the threat actors employed lures related to major events like societal change in Iran and ongoing investigations into the militarization of the Islamic Revolutionary Guard Corps (IRGC). This tactical use of relevant, high-interest themes significantly increases the probability that targets will engage with the malicious communications, making the campaigns particularly effective within this specialized victim pool.

Proofpoint’s analysis reveals that this new cluster of activity bears striking tactical similarities to prior operations executed by several established Iranian cyber espionage groups. Specifically, the techniques mirror those used by groups known as TA455 (Smoke Sandstorm), TA453 (Charming Kitten), and TA450 (MuddyWater). This overlap suggests that UNK_SmudgedSerpent may be a newly formed unit, a splinter group, or an operation utilizing the collective toolset and playbook of these prominent state-affiliated actors.

A significant portion of the email attacks exhibited all the classic traits associated with Charming Kitten. In these instances, the threat actors would initiate seemingly benign, prolonged conversations with prospective victims, a technique known as “reeling in,” to establish trust before launching the actual phishing attempt. Once trust was gained, the final stage of the attack was initiated, aiming to trick the target into surrendering their sensitive login credentials.

Furthermore, in specific attack variations, the digital communications contained malicious URLs designed to compel recipients to download a file masquerading as a legitimate Microsoft Teams installer. This file, however, was in fact an MSI installer that delivered legitimate yet potent Remote Monitoring and Management (RMM) software, such as PDQ Connect. This particular method of weaponizing legitimate IT tools is a favored tactic frequently observed and embraced by the MuddyWater threat group, and was enhanced by the attackers impersonating high-profile U.S. foreign policy figures from influential think tanks like the Brookings Institution to boost the perceived legitimacy and ultimate success of the phishing campaign.

Reference:

  • Smudged Serpent Hackers Target US Policy Experts Amid Rising Iran Israel Tensions
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Microsoft Edge Adds Scareware Sensor

Post SMTP Plugin Hijacks Admins

November 5, 2025

React Native CLI Flaw Exposed

November 5, 2025
China Linked Tick Exploits Lanscope

CISA Warns Linux Flaw Exploited

November 4, 2025
China Linked Tick Exploits Lanscope

China Linked Tick Exploits Lanscope

November 4, 2025
China Linked Tick Exploits Lanscope

Nation State Hackers Deploy Airstalk

November 4, 2025
HTTPTroy Backdoor Poses As VPN Invoice

HTTPTroy Backdoor Poses As VPN Invoice

November 3, 2025

Latest Alerts

Post SMTP Plugin Hijacks Admins

React Native CLI Flaw Exposed

Smudged Serpent Targets US Experts

CISA Warns Linux Flaw Exploited

China Linked Tick Exploits Lanscope

Nation State Hackers Deploy Airstalk

Subscribe to our newsletter

    Latest Incidents

    Hackers Target UK Water Suppliers

    Nikkei Data Breach Hits 17000

    Apache OpenOffice Denies Breach

    Cybercriminals Exploit Remote Monitoring

    Malibu Boats Australia Hit By Ransomware

    Balancer Suffers 128 Million Exploit

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial