Phosphorus Targets Israeli and US Officials with Spear-Phishing
- Actor Motivations: Espionage,Exfiltration
- Attack Vectors: Spear Phishing
- Attack Complexity: Medium
- Threat Risk: Low Impact/High Probability
Threat Overview
This report from Check Point Research details an Iranian spear-phishing campaign targeting high-profile former Israeli and US officials. According to Check Point, the high-profile targets of this operation include Tzipi Livni, former Israeli Foreign Minister and Deputy Prime Minister; a former major general in the Israeli Defence Forces (IDF) who held a highly sensitive position; the chairman of a leading Israeli security think tank; a former US ambassador to Israel; the former chairman of a prominent Middle East research centre; and a senior executive in the Israeli defence industry. The attackers used sophisticated techniques, including email thread hijacking and a custom URL shortener, to trick victims into revealing sensitive information. A legitimate identity verification service was also exploited to steal identity documents. The report analyses the attack infrastructure, methods and possible attribution to the Iran-linked Phosphorus APT group, suggesting a motive that may be linked to escalating geopolitical tensions between Iran and Israel. The ultimate goal appears to be access to victims' inboxes and personally identifiable information (PII), although the possibility of physical harm is also considered.
Detected Targets
Type | Description | Confidence |
---|---|---|
Case | Tzipi Livni Tziporah Malka "Tzipi" Livni is an Israeli politician, diplomat, and lawyer. A former member of the Knesset and leader in the center-left political camp, Livni is a former foreign minister, vice prime minister, minister of justice, and leader of the opposition. Tzipi Livni has been targeted by Phosphorus as the main target. | Verified |
Sector | Defense | Verified |
Sector | Government Agencies and Services | Verified |
Sector | Military | Verified |
Sector | Researchers | Verified |
Region | Israel | Verified |
Region | United States | Verified |
Extracted IOCs
- de-ma[.]online
- litby[.]us
- joe.doe.corp@gmail[.]com
Tip: 3 related IOCs (0 IP, 2 domain, 0 URL, 1 email, 0 file hash) to this threat have been found.
Overlaps
Source: Internet Crime Complaint Center - September 2024
Detection (two cases): de-ma[.]online, litby[.]us
Source: Google Cloud - May 2024
Detection (one case): litby[.]us
Source: Microsoft - October 2020
Detection (one case): de-ma[.]online
Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.