Normal view

Received before yesterday

Google, Apple Warn of State-Linked Surveillance Threats

spyware

Google and Apple have released new global cyber threat notifications, alerting users across dozens of countries to potential targeting by state-linked hackers. The latest warnings reflect growing concerns about government-backed surveillance operations and the expanding commercial spyware marketplace.  Both companies confirmed that the alerts were sent this week as part of their ongoing efforts to protect users from digital espionage. The warnings are tied to commercial surveillance firms, including Intellexa, which has been repeatedly linked to high-end spyware deployments around the globe. 

Apple Sends Warning Across More than 80 Countries 

Apple stated that its newest set of threat notifications was dispatched on December 2, though the company declined to identify the number of affected users or the specific actors involved. These warnings are triggered when technical evidence indicates that individuals are being deliberately targeted by advanced hacking techniques believed to be connected to state agencies or their contractors.  While Apple did not specify locations for this week’s alerts, it confirmed that, since the initiative began, users in more than 150 countries have received similar warnings. This aligns with the company’s broader strategy of alerting customers when activity consistent with state-directed surveillance operations is detected. 

Google Reports Intellexa Spyware Targeting Several Hundred Accounts 

Google also announced that it had notified “several hundred accounts” identified as being targeted by spyware developed by Intellexa, a surveillance vendor sanctioned by the United States. According to Google’s threat intelligence team, the attempted compromises spanned a wide geographic range. Users in Pakistan, Kazakhstan, Angola, Egypt, Uzbekistan, Saudi Arabia, and Tajikistan were among those affected. 
Also read: Sanctioned Spyware Vendor Used iOS Zero-Day Exploit Chain Against Egyptian Targets
The tech giant stated that Intellexa has continued to operate and adapt its tools despite U.S. sanctions. Executives associated with the company did not respond to inquiries about the allegations. Google also noted that this round of alerts covered people in more than 80 countries, stressing the nature of the attempted intrusions by state-linked hackers.

Rising Scrutiny of Commercial Spyware 

The latest notifications from Google and Apple are part of a bigger concern surrounding the global spyware industry. Both companies have repeatedly warned that commercial surveillance tools, particularly those sold to government clients, are becoming increasingly common in targeting journalists, activists, political figures, and other high-risk individuals.  Previous disclosures from Apple and Google have already prompted official scrutiny. The European Union has launched investigations in past cases, especially after reports that senior EU officials were targeted with similar spyware technologies. These inquiries often expand into broader examinations of cross-border surveillance practices and the companies that supply such tools. 
Also read: Leaked Files Expose Intellexa’s Remote Access to Customer Systems and Live Surveillance Ops

Tech Firms Decline to Name Specific Attackers 

Despite the breadth of the new alerts, neither Google nor Apple offered details about the identities of the actors behind the latest attempts. Apple also declined to describe the nature of the malicious activity detected. Both companies stress that withholding technical specifics is common when dealing with state-linked hackers, as revealing investigative methods could interfere with ongoing monitoring operations.  Although the exact attackers remain unnamed, the alerts demonstrate a global distribution of spyware activity. Google’s identification of affected users across multiple continents, along with Apple’s acknowledgment of notifications issued in over 150 countries over time, shows that the threat posed by government-aligned surveillance groups continues to expand. 

US Offers $10M for Iranian Cyber Operatives Behind Election Interference and Critical Infrastructure Attacks

3 December 2025 at 02:25

Iranian Cyber Operatives, IRGC, Iranian Hackers

Fatemeh Sedighian Kashi and Mohammad Bagher Shirinkar maintain a close working relationship coordinating cyber operations targeting elections, US critical infrastructure and businesses through the Iranian Revolutionary Guard Corps cyber unit known as Shahid Shushtari. The U.S. Department of State announced rewards of up to $10 million for information leading to their identification or location, marking the latest effort to disrupt operations of Iranian cyber operatives that has caused significant financial damage and operational disruption across multiple sectors including news, shipping, travel, energy, financial services, and telecommunications throughout the United States, Europe, and the Middle East. Shirinkar oversees the Shahid Shushtari group, previously identified under multiple cover names including Aria Sepehr Ayandehsazan, Emennet Pasargad, Eeleyanet Gostar, and Net Peygard Samavat Company. Whereas, Sedighian serves as a long-time employee working closely with Shirinkar in planning and conducting cyber operations on behalf of Iran's IRGCs Cyber-Electronic Command, the State Department said.

In August 2020, Shahid Shushtari actors began a multi-faceted campaign targeting the US presidential election, combining computer intrusion activity with exaggerated claims of access to victim networks to enhance psychological effects. The US Treasury Department designated Shahid Shushtari and six employees on November 18, 2021, pursuant to Executive Order 13848 for attempting to influence the 2020 election.

Read: Six Iranian Hackers Identified in Cyberattacks on US Water Utilities, $10 Million Reward Announced

The Infrastructure and Olympic Targeting

Since 2023, Shahid Shushtari established fictitious hosting resellers named "Server-Speed" and "VPS-Agent" to provision operational server infrastructure while providing plausible deniability. These resellers procured server space from Europe-based providers including Lithuania's BAcloud and UK-based Stark Industries Solutions.

In July 2024, actors used VPS-Agent infrastructure to compromise a French commercial dynamic display provider, attempting to display photo montages denouncing Israeli athletes' participation in the 2024 Olympics. This cyberattack was coupled with disinformation including fake news articles and threat messages to Israeli athletes under the banner of a fake French far-right group.

Following the October 7, 2023, Hamas attack, Shahid Shushtari used cover personas including "Contact-HSTG" to contact family members of Israeli hostages, attempting to inflict psychological trauma. The group also undertook significant efforts to enumerate and obtain content from IP cameras in Israel, making images available via several servers.

AI Integration and Hack-and-Leak Operations

Shahid Shushtari incorporated artificial intelligence into operations, including AI-generated news anchors in the "For-Humanity" operation that impacted a US-based Internet Protocol Television streaming company in December 2023. The group leverages AI services including Remini AI Photo Enhancer, Voicemod, Murf AI for voice modulation, and Appy Pie for image generation, a joint October advisory from the U.S. and Israeli agencies stated.

Since April 2024, the group used the online persona "Cyber Court" to promote activities of cover-hacktivist groups including "Makhlab al-Nasr," "NET Hunter," "Emirate Students Movement," and "Zeus is Talking," conducting malicious activity protesting the Israel-Hamas conflict.

FBI assessments indicate these hack-and-leak operations are intended to undermine public confidence in victim network security, embarrass companies and targeted countries through financial losses and reputational damage.

Anyone with information on Mohammad Bagher Shirinkar, Fatemeh Sedighian Kashi, or Shahid Shushtari should contact Rewards for Justice through its secure Tor-based tips-reporting channel.

Anthropic Claude AI Used by Chinese-Back Hackers in Spy Campaign

14 November 2025 at 09:29
sysdig, ai agents, AI, Agents, agentic ai, security, Qevlar, funding,

AI vendor Anthropic says a China-backed threat group used the agentic capabilities in its Claude AI model to automate as much as 90% of the operations in a info-stealing campaign that presages how hackers will used increasingly sophisticated AI capabilities in future cyberattacks.

The post Anthropic Claude AI Used by Chinese-Back Hackers in Spy Campaign appeared first on Security Boulevard.

Chinese Hackers Weaponize Claude AI to Execute First Autonomous Cyber Espionage Campaign at Scale

14 November 2025 at 02:11

AI Agent, AI Assistant, Prompy Injection, Claude, Claude AI

The AI executed thousands of requests per second.

That physically impossible attack tempo, sustained across multiple simultaneous intrusions targeting 30 global organizations, marks what Anthropic researchers now confirm as the first documented case of a large-scale cyberattack executed without substantial human intervention.

In the last two weeks of September, a Chinese state-sponsored group, now designated as GTG-1002 by Anthropic defenders, manipulated Claude Code to autonomously conduct reconnaissance, exploit vulnerabilities, harvest credentials, move laterally through networks, and exfiltrate sensitive data with human operators directing just 10 to 20% of tactical operations.

The campaign represents a fundamental shift in threat actor capabilities. Where previous AI-assisted attacks required humans directing operations step-by-step, this espionage operation demonstrated the AI autonomously discovering vulnerabilities in targets selected by human operators, successfully exploiting them in live operations, then performing wide-ranging post-exploitation activities including analysis, lateral movement, privilege escalation, data access, and exfiltration.

Social Engineering the AI Model

The threat actors bypassed Claude's extensive safety training through sophisticated social engineering. Operators claimed they represented legitimate cybersecurity firms conducting defensive penetration testing, convincing the AI model to engage in offensive operations under false pretenses.

The attackers developed a custom orchestration framework using Claude Code and the open-standard Model Context Protocol to decompose complex multi-stage attacks into discrete technical tasks. Each task appeared legitimate when evaluated in isolation, including vulnerability scanning, credential validation, data extraction, and lateral movement.

By presenting these operations as routine technical requests through carefully crafted prompts, the threat actor induced Claude to execute individual components of attack chains without access to broader malicious context. The sustained nature of the attack eventually triggered detection, but this role-playing technique allowed operations to proceed long enough to launch the full campaign.

Unprecedented Autonomous Attack Lifecycle

Claude conducted nearly autonomous reconnaissance, using browser automation to systematically catalog target infrastructure, analyze authentication mechanisms, and identify potential vulnerabilities simultaneously across multiple targets. The AI maintained separate operational contexts for each active campaign independently.

[caption id="attachment_106770" align="aligncenter" width="600"]Claude, Claude AI Hacking The lifecycle of the cyberattack. (Image source: Anthropic)[/caption]

In one validated successful compromise, Claude autonomously discovered internal services, mapped complete network topology across multiple IP ranges, and identified high-value systems including databases and workflow orchestration platforms. Similar autonomous enumeration occurred against other targets, with the AI independently cataloging hundreds of discovered services and endpoints.

Exploitation proceeded through automated testing with Claude independently generating attack payloads tailored to discovered vulnerabilities, executing testing through remote command interfaces, and analyzing responses to determine exploitability without human direction. Human operators maintained strategic oversight only at critical decision gates, including approving progression from reconnaissance to active exploitation and authorizing use of harvested credentials.

Upon receiving authorization, Claude executed systematic credential collection across targeted networks, querying internal services, extracting authentication certificates, and testing harvested credentials autonomously. The AI independently determined which credentials provided access to which services, mapping privilege levels and access boundaries.

Intelligence Extraction at Machine Speed

Collection operations demonstrated the most extensive AI autonomy. Against one targeted technology company, Claude independently queried databases, extracted data, parsed results to identify proprietary information, and categorized findings by intelligence value without human analysis.

In documented database extraction operations spanning two to six hours, Claude authenticated with harvested credentials, mapped database structure, queried user account tables, extracted password hashes, identified high-privilege accounts, created persistent backdoor user accounts, downloaded complete results, parsed extracted data for intelligence value, and generated summary reports. Human operators reviewed findings and approved final exfiltration targets in just five to twenty minutes.

The operational infrastructure relied overwhelmingly on open-source penetration testing tools orchestrated through custom automation frameworks built around Model Context Protocol servers. Peak activity included thousands of requests representing sustained request rates of multiple operations per second, confirming AI actively analyzed stolen information rather than generating explanatory content for human review.

AI Hallucination Limitation

An important operational limitation emerged during investigation. Claude frequently overstated findings and occasionally fabricated data during autonomous operations, claiming to have obtained credentials that did not work or identifying critical discoveries that proved to be publicly available information.

This AI hallucination in offensive security contexts required careful validation of all claimed results. Anthropic researchers assess this remains an obstacle to fully autonomous cyberattacks, though the limitation did not prevent the campaign from achieving multiple successful intrusions against major technology corporations, financial institutions, chemical manufacturing companies, and government agencies.

Anthropic's Response

Upon detecting the activity, Anthropic immediately launched a ten-day investigation to map the operation's full extent. The company banned accounts as they were identified, notified affected entities, and coordinated with authorities.

Anthropic implemented multiple defensive enhancements including expanded detection capabilities, improved cyber-focused classifiers, prototyped proactive early detection systems for autonomous cyber attacks, and developed new techniques for investigating large-scale distributed cyber operations.

This represents a significant escalation from Anthropic's June 2025 "vibe hacking" findings where humans remained very much in the loop directing operations.

Read: Hacker Used Claude AI to Automate Reconnaissance, Harvest Credentials and Penetrate Networks

Anthropic said the cybersecurity community needs to assume a fundamental change has occurred. Security teams must experiment with applying AI for defense in areas including SOC automation, threat detection, vulnerability assessment, and incident response. The company notes that the same capabilities enabling these attacks make Claude crucial for cyber defense, with Anthropic's own Threat Intelligence team using Claude extensively to analyze enormous amounts of data generated during this investigation.

Iran-linked Threat Group Claims Breach of Israeli Defense Contractor’s Security Cameras

5 November 2025 at 11:36

Israeli defense contractor hacked

An Iran-linked threat group claims to have accessed the security cameras of an Israeli defense contractor and leaked videos of internal meetings and employees working on defense systems. The threat group – Cyber Toufan – has been posting about the alleged breach of Maya Engineering on its Telegram channels for at least a few weeks, but the group’s claims became public in recent days in an X post and articles on media sites such as Straight Arrow News and Breached Company. The claims remain unverified, and The Cyber Express has reached out to Maya for comment and will update this article with any official statement, but the alleged incident shows the importance of including surveillance cameras and other sensitive devices in cybersecurity plans. “Scary stuff,” SANS instructor and consultant Kevin Garvey said on X. “Shows how *any* connected asset needs rigorous security associated to it! Good reminder to all to check if cameras and other peripherals are part of your standard vuln management and secure config programs (amongst others functional programs).”

Alleged Israeli Defense Contractor Breach

A check of Cyber Toufan’s Telegram channels by The Cyber Express found claims of the hack as early as October 12 (image below). [caption id="attachment_106549" align="aligncenter" width="533"]Israeli defense contractor hacked October 12 Telegram post by Cyber Toufan claiming Maya hack[/caption] However, the group claims to have had access to Maya’s systems for more than a year. “One and a half years after gaining full access to the network, we have explored every part of it and reached the QNAP archive,” claims a Cyber Toufan post reported by International Cyber Digest on X. “Through the systems, we have breached Elbit and Rafael's through then. Their phones, printers, routers and cameras as well. We have recorded your meetings with sound and video for over a year. This is just the beginning with Maya!” Footage released by the group shows company employees allegedly working on several defense systems, including missile and drone systems, and the group also claims to possess technical drawings of sensitive parts like missile components.

Cyber Toufan's Link to Iran

Cyber Toufan’s advanced tactics suggest technical acumen well beyond that of a typical hacktivist group, raising the possibility of a nation-state link to Iran. Cyble’s threat intelligence profile of the group states, “Cyber Toufan is a threat actor group known for targeting Israeli organizations, with possible nation-state support from Iran. Their tactics include hack-and-leak operations, data breaches, and data destruction, impacting numerous organizations. Their activities are linked to geopolitical tensions in the Middle East, featuring a mix of technical breaches and psychological warfare. Threat actors associated with Cyber Toufan operate by infiltrating systems to steal sensitive data and disrupt operations, aiming to cause economic and political damage to their targets.”

Hackers Targeting Freight Operators to Steal Cargo: Proofpoint

5 November 2025 at 06:53

Threat actors are working with organized crime groups to target freight operators and transportation companies, infiltrate their systems through RMM software, and steal cargo, which they then sell online or ship to Europe, according to Proofpoint researchers, who saw similar campaigns last year.

The post Hackers Targeting Freight Operators to Steal Cargo: Proofpoint appeared first on Security Boulevard.

❌