Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Tech Tools & Mobile / Apps»Iran-linked hackers use Cold War tricks and fake online identities to steal secrets from Apple and Microsoft users
    Tech Tools & Mobile / Apps

    Iran-linked hackers use Cold War tricks and fake online identities to steal secrets from Apple and Microsoft users

    adminBy adminApril 5, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    hackers
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Charming Kitten relies on deception rather than exploiting technical software vulnerabilities
    • Fake identities build trust before phishing attacks compromise sensitive user credentials
    • Operations extend across Apple and Microsoft platforms, affecting diverse users globally

    Iran-linked cyber operations are drawing renewed attention for relying less on advanced code and more on human manipulation to gain access to sensitive systems.

    At the centre of this activity is Charming Kitten, a group associated with Iran’s security apparatus which has spent years targeting officials, researchers, and corporate employees.

    Instead of exploiting technical vulnerabilities, operatives frequently impersonate trusted contacts, using carefully crafted messages to trick victims into revealing credentials or installing malicious software.

    Article continues below


    You may like

    Cold War tactics and social engineering

    These tactics echo intelligence strategies more commonly associated with Cold War espionage, where access and trust often proved more effective than technical superiority.

    Fake online identities — including personas built around attractive or credible profiles — are used to establish relationships before launching phishing attacks.

    This approach has enabled the group to operate across platforms used by both Apple and Microsoft ecosystems, exposing both Mac and Windows users to compromise.

    Alongside external deception campaigns, investigators have raised concerns about insider threats linked to individuals embedded within major technology firms.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    A high-profile case involving members of the Ghandali family centres on allegations of trade secret theft from companies including Google.

    Prosecutors claim that sensitive data related to processor security and cryptography was extracted over time and transferred outside the United States.

    Ex-counterintelligence officials describe the method as a “slow, deliberate extraction” carried out by actors with training or external direction.


    What to read next

    Rather than relying on digital exfiltration tools, some of the alleged activity involved photographing computer screens — a low-technology method designed to avoid detection by cybersecurity systems.

    “The most damaging breaches often originate from within,” one expert noted, adding that trusted access can bypass even advanced defenses.

    Analysts argue that these operations reflect a wider intelligence framework that combines cyber activity, human networks, and surveillance capabilities.

    Former officials state that Iran has developed a layered approach that includes recruitment, online intelligence gathering, and procurement channels.

    One source described Iran as “the third most sophisticated adversary,” adding that its activities were underestimated for years compared with those of larger rivals.

    The same networks have also been linked to monitoring dissidents abroad, indicating that operations are not limited to economic or military objectives.

    This dual focus — external competition and internal control — complicates assessments of intent and scale.

    Cases such as that of Monica Witt, who allegedly provided intelligence to Iran after defecting, reinforce concerns about insider cooperation.

    Staying safe from phishing and espionage requires a layered approach to digital security. Users should verify identities before sharing credentials or sensitive information.

    Strong, unique passwords combined with multi-factor authentication help limit account compromise.

    Also, installing reliable antivirus software protects against known threats, while maintaining an active firewall prevents unauthorized access.

    In addition, trusted malware removal tools can detect and eliminate suspicious activity before it spreads.

    Via MSN


    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

    Apple cold Fake hackers identities IranLinked Microsoft Online secrets steal tricks Users war
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHackers exploit React2Shell in automated credential theft campaign
    Next Article Fear not: Samsung is investigating the Galaxy S26 Ultra’s ‘blurry’ camera
    admin
    • Website

    Related Posts

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    Dragon City: Mobile Adventure 26.5.0 APK Download by Social Point

    April 16, 2026

    I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    How to Use Google Ads Brand Guidelines for Cleaner Automated Assets

    April 16, 2026

    Dragon City: Mobile Adventure 26.5.0 APK Download by Social Point

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,347)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (828)
    • Tech Tools & Mobile / Apps (1,612)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    How to Use Google Ads Brand Guidelines for Cleaner Automated Assets

    April 16, 2026
    Most Popular
    • ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows
    • Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
    • How to Use Google Ads Brand Guidelines for Cleaner Automated Assets
    • Dragon City: Mobile Adventure 26.5.0 APK Download by Social Point
    • OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal
    • Gemini blocked more than 99% of bad ads before they ran in 2025
    • I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell
    • IBM unveils security services for thwarting agentic attacks, automating threat assessment
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.