TA453 Targets Jewish Religious Leader with Sophisticated BlackSmith Malware
- Actor Motivations: Espionage,Exfiltration
- Attack Vectors: Malware,Phishing
- Attack Complexity: Medium
- Threat Risk: High Impact/High Probability
Threat Overview
Iranian threat actor TA453 targeted a prominent Jewish religious figure with a fake podcast invitation, delivering the new BlackSmith malware toolkit. The attack leveraged spearphishing links and malicious LNK files to deploy the AnvilEcho PowerShell trojan. AnvilEcho consolidates TA453’s previous malware capabilities into a single script, facilitating intelligence gathering and system reconnaissance. The malware evades detection through obfuscation, steganography, and encrypted communications with TA453-controlled infrastructure. The operation, aligned with Iranian government interests, highlights TA453’s evolving tactics to support espionage.
Detected Targets
Type | Description | Confidence |
---|---|---|
Case | Institute for the Study of War (ISW) The Institute for the Study of War is an American nonprofit research group and think tank founded in 2007 by military historian Kimberly Kagan and headquartered in Washington, D.C. ISW provides research and analysis regarding issues of defense and foreign affairs. Institute for the Study of War (ISW) has been targeted by TA453 with abusive purposes. | Verified |
Sector | Religious | Verified |
Region | Israel | Verified |
Extracted IOCs
- d75[.]site
- deepspaceocean[.]info
- theworkpc[.]com
- understandingthewar[.]org
- dropzilla.theworkpc[.]com
- 258d9d67e14506b70359daabebd41978c7699d6ce75533955736cdd2b8192c1a
- 574fc53ba2e9684938d87fc486392568f8db0b92fb15028e441ffe26c920b4c5
- 5aee738121093866404827e1db43c8e1a7882291afedfe90314ec90b198afb36
- 5dca88f08b586a51677ff6d900234a1568f4474bbbfef258d59d73ca4532dcaf
- 8a47fd166059e7e3c0c1740ea8997205f9e12fc87b1ffe064d0ed4b0bf7c2ce1
- d033db88065bd4f548ed13287021ac899d8c3215ebc46fdd33f46a671bba731c
- dc5c963f1428db051ff7aa4d43967a4087f9540a9d331dea616ca5013c6d67ce
- dcb072061defd12f12deb659c66f40473a76d51c911040b8109ba32bb36504e3
- 54[.]39.143.117
- 54[.]39.143.120
Tip: 15 related IOCs (2 IP, 5 domain, 0 URL, 0 email, 8 file hash) to this threat have been found.
Overlaps
Source: Google - August 2024
Detection (one case): understandingthewar[.]org
Source: Google Cloud - May 2024
Detection (one case): d75[.]site
Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.