Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Can AI judge journalism? A Thiel-backed startup says yes, even if it risks chilling whistleblowers

    April 16, 2026

    AI learning app Gizmo levels up with 13M users and a $22M investment

    April 16, 2026

    Feds will require data centers to show their power bills

    April 16, 2026
    Facebook Twitter Instagram
    • Tech
    • Gadgets
    • Spotlight
    • Gaming
    Facebook Twitter Instagram
    iGadgets TechiGadgets Tech
    Subscribe
    • Home
    • Gadgets
    • Insights
    • Apps

      Can AI judge journalism? A Thiel-backed startup says yes, even if it risks chilling whistleblowers

      April 16, 2026

      AI learning app Gizmo levels up with 13M users and a $22M investment

      April 16, 2026

      Feds will require data centers to show their power bills

      April 16, 2026

      LinkedIn data shows AI isn’t to blame for hiring decline… yet

      April 16, 2026

      Wait, could they still actually break up Live Nation?

      April 16, 2026
    • Gear
    • Mobiles
      1. Tech
      2. Gadgets
      3. Insights
      4. View All

      X’s Big Bot Purge Wiped Out a Lot of People’s Secret Porn Feeds

      April 16, 2026

      AI Slop Is Making the Internet Fake-Happy

      April 16, 2026

      'The Last Airbender' Leaked Online. Some Fans Say Paramount Deserves the Fallout

      April 15, 2026

      Allbirds Is Pivoting to AI Compute. Sure, Why Not

      April 15, 2026

      March Update May Have Weakened The Haptics For Pixel 6 Users

      April 2, 2022

      Project 'Diamond' Is The Galaxy S23, Not A Rollable Smartphone

      April 2, 2022

      The At A Glance Widget Is More Useful After March Update

      April 2, 2022

      Pre-Order The OnePlus 10 Pro For Just $1 In The US

      April 2, 2022

      Motorola Edge+ Review: It Checks A Lot Of Boxes

      April 2, 2022

      This Smartphone Concept Design Is Different… In A Good Way

      April 2, 2022

      Twitter Just Made Searching Your Direct Messages Better

      April 2, 2022

      That Netflix Price Hike Is Starting To Take Place

      April 2, 2022

      Latest Huawei Mobiles P50 and P50 Pro Feature Kirin Chips

      January 15, 2021

      Samsung Galaxy M62 Benchmarked with Galaxy Note10’s Chipset

      January 15, 2021
      9.1

      Review: T-Mobile Winning 5G Race Around the World

      January 15, 2021
      8.9

      Samsung Galaxy S21 Ultra Review: the New King of Android Phones

      January 15, 2021
    • Computing
    iGadgets TechiGadgets Tech
    Home»Apps»How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East
    Apps

    How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East

    adminBy adminJanuary 16, 2026No Comments10 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    in this photo illustration, the Whatsapp app logo can be seen through a magnifying glass on the display of a smartphone.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    On Tuesday, U.K.-based Iranian activist Nariman Gharib tweeted redacted screenshots of a phishing link sent to him via a WhatsApp message.

    “Do not click on suspicious links,” Gharib warned. The activist, who is following the digital side of the Iranian protests from afar, said the campaign targeted people involved in Iran-related activities, such as himself.

    This hacking campaign comes as Iran grapples with the longest nationwide internet shutdown in its history, as anti-government protests — and violent crackdowns — rage across the country. Given that Iran and its closest adversaries are highly active in the offensive cyberspace (read: hacking people), we wanted to learn more. 

    Gharib shared the full phishing link with TechCrunch soon after his post, allowing us to capture a copy of the source code of the phishing web page used in the attack. He also shared a write-up of his findings.

    TechCrunch analyzed the source code of the phishing page, and with added input from security researchers, we believe the campaign aimed to steal Gmail and other online credentials, compromise WhatsApp accounts, and conduct surveillance by stealing location data, photos, and audio recordings. 

    It is unclear, however, if the hackers were government-linked agents, spies, or cybercriminals — or all three. 

    TechCrunch also identified a way to view a real-time copy of all the victims’ responses saved on the attacker’s server, which was left exposed and accessible without a password. This data revealed dozens of victims who had unwittingly entered their credentials into the phishing site and were subsequently likely hacked.

    The list includes a Middle Eastern academic working in national security studies; the boss of an Israeli drone maker; a senior Lebanese cabinet minister; at least one journalist; and people in the United States or with U.S. phone numbers. 

    TechCrunch is publishing our findings after validating much of Gharib’s report. The phishing site is now down.

    Inside the attack chain

    According to Gharib, the WhatsApp message he received contained a suspicious link, which loaded a phishing site in the victim’s browser.

    two screenshots side by side of a WhatsApp message, showing a malicious link to whatsapp-meeting.duckdns.org.
    Image Credits:Nariman Gharib

    The link shows that the attackers relied on a dynamic DNS provider called DuckDNS for their phishing campaign. Dynamic DNS providers allow people to connect easy-to-remember web addresses — in this case, a duckdns.org subdomain — to a server where its IP address might frequently change. 

    It’s not clear whether the attackers shut down the phishing site of their own accord or were caught and cut off by DuckDNS. We reached out to DuckDNS with inquiries, but its owner Richard Harper requested that we send an abuse report instead.

    From what we understand, the attackers used DuckDNS to mask the real location of the phishing page, presumably to make it look like a genuine WhatsApp link. 

    The phishing page was actually hosted at alex-fabow.online, a domain that was first registered in early November 2025. This domain has several other, related domains hosted on the same dedicated server, and these domain names follow a pattern that suggests the campaign also targeted other providers of virtual meeting rooms, like meet-safe.online and whats-login.online.

    We’re not sure what happens while the DuckDNS link loads in the victim’s browser, or how the link determines which specific phishing page to load. It may be that the DuckDNS link redirects the target to a specific phishing page based on information it gleans from the user’s device.

    The phishing page would not load in our web browser, preventing us from directly interacting with it. Reading the source code of the page, however, allowed us to better understand how the attack worked.

    Gmail credential and phone number phishing

    Depending on the target, tapping on a phishing link would open a fake Gmail login page, or ask for their phone number, and begin an attack flow aimed at stealing their password and two-factor authentication code. 

    But the source code of the phishing page code had at least one flaw: TechCrunch found that by modifying the phishing page’s URL in our web browser, we could view a file on the attacker’s servers that was storing records of every victim who had entered their credentials. 

    The file contained over 850 records of information submitted by victims during the attack flow. These records detailed each part of the phishing flow that the victim was in. This included copies of the usernames and passwords that victims had entered on the phishing page, as well as incorrect entries and their two-factor codes, effectively serving as a keylogger. 

    The records also contained each victim’s user agent, a string of text that identifies the operating system and browser versions used to view websites. This data shows that the campaign was designed to target Windows, macOS, iPhone, and Android users.

    The exposed file allowed us to follow the attack flow step-by-step for each victim. In one case, the exposed file shows a victim clicking on a malicious link, which opened a page that looked like a Gmail sign-in window. The log shows the victim entering their email credentials several times until they enter the correct password. 

    The records show the same victim entering their two-factor authentication code sent to them by text message. We can tell this because Google sends two-factor codes in a specific format (usually G-xxxxxx, featuring a six-digit numerical code).

    WhatsApp hijack and browser data exfiltration

    Beyond credential theft, this campaign also seemed to enable surveillance by tricking victims into sharing their location, audio, and pictures from their device.

    In Gharib’s case, tapping on the link in the phishing message opened a fake WhatsApp-themed page in his browser, which displayed a QR code. The lure aims to trick the target into scanning the code on their device, purportedly to access a virtual meeting room.

    a stream of exposed records from the attacker's server, showing reams of attack-flow data, such as sign-ins and the entering of passwords on the phishing page
    Image Credits:TechCrunch

    Gharib said the QR code was generated by the attacker, and scanning or tapping it would instantly link the victim’s WhatsApp account to a device controlled by the attacker, granting them access to the victim’s data. This is a long-known attack technique that abuses the WhatsApp device linking feature and has been similarly abused to target users of messaging app Signal.

    We asked Granitt founder Runa Sandvik, a security researcher who works to help secure at-risk individuals, to examine a copy of the phishing page code and see how it functions. 

    Sandvik found that when the page loaded, the code would trigger a browser notification asking the user for permission to access their location (via navigator.geolocation), as well as photos and audio (navigator.getUserMedia). 

    If accepted, the browser would immediately send the person’s coordinates to the attacker, capable of identifying the location of the victim. The page would then continue to share the victim’s location data every few seconds, for as long as the page remained open. 

    The code also allowed the attackers to record bursts of audio and snap photos every three to five seconds using the device camera. However, we did not see any location data, audio, or images that had been collected on the server.

    Thoughts on victims, timing, and attribution

    We do not know who is behind this campaign. What is clear is that the campaign was successful in stealing credentials from victims, and it is possible that the phishing campaign could resurface. 

    Despite knowing the identities of some of the people in this cluster of victims who were targeted, we don’t have enough information to understand the nature of the campaign. The number of victims hacked by this campaign (that we know of) is fairly low — fewer than 50 individuals — and affects seemingly ordinary people across the Kurdish community, as well as academics, government officials, business leaders, and other senior figures across the broader Iranian diaspora and Middle East.

    It may be that there are far more victims than we are aware of, which could help us understand who was targeted and potentially why.

    The case that this could be a government-backed actor

    It is unclear what motivated the hackers to steal people’s credentials and hijack their WhatsApp accounts, which could also help identify who is behind this hacking campaign.

    A government-backed group, for example, might want to steal the email password and two-factor codes of a high-value target, like a politician or journalist, so they can download private and confidential information.

    That could make sense since Iran is currently almost entirely cut off from the outside world, and getting information in or out of the country presents a challenge. Both the Iranian government, or a foreign government with interests in Iran’s affairs, could plausibly want to know who influential Iranian-linked individuals are communicating with, and what about.

    As such, the timing of this phishing campaign and who it appears to be targeting could point to an espionage campaign aimed at trying to collect information about a narrow list of people.

    We asked Gary Miller, a security researcher at Citizen Lab and mobile espionage expert, to also review the phishing code and some of the exposed data from the attacker’s server. 

    Miller said the attack “certainly [had] the hallmarks of an IRGC-linked spearphishing campaign,” referring to highly targeted email hacks carried out by Iran’s Islamic Revolutionary Guard Corps (IRGC), a faction of Iran’s military known for carrying out cyberattacks. Miller pointed to a mix of indications, including the international scope of victim targeting, credential theft, the abuse of popular messaging platforms like WhatsApp, and social engineering techniques used in the phishing link.

    The case that this might be a financially motivated actor

    On the other hand, a financially motivated hacker could use the same stolen Gmail password and two-factor code of another high-value target, such as a company executive, to steal proprietary and sensitive business information from their inbox. The hacker could also forcibly reset passwords of their victim’s cryptocurrency and bank accounts to empty their wallets.

    The campaign’s focus on accessing a victim’s location and device media, however, is unusual for a financially motivated actor, who might have little use for pictures and audio recordings.

    We asked Ian Campbell, a threat researcher at DomainTools, which helps analyze public internet records, to look at the domain names used in the campaign to help understand when they were first set up, and if these domains were connected to any other previously known or identified infrastructure. 

    Campbell found that while the campaign targeted victims in the midst of Iran’s ongoing nationwide protests, its infrastructure had been set up weeks ago. He added that most of the domains connected to this campaign were registered in early November 2025, and one related domain was created months back in August 2025. Campbell described the domains as medium to high risk and said they appear to be linked to a cybercrime operation driven by financial motivations.

    An additional wrinkle is that Iran’s government has been known to outsource cyberattacks to criminal hacking groups, presumably to shield its involvement in hacking operations against its citizens. The U.S. Treasury has sanctioned Iranian companies in the past for acting as fronts for Iran’s IRGC and conducting cyberattacks, such as launching targeted phishing and social engineering attacks. 

    As Miller notes, “This drives home the point that clicking on unsolicited WhatsApp links, no matter how convincing, is a high-risk, unsafe practice.”

    To securely contact this reporter, you can reach out using Signal via the username: zackwhittaker.1337

    Lorenzo Franceschi-Bicchierai contributed reporting.

    Security,cyberattacks,cybersecurity,data exposure,gmail,iran,Middle East,WhatsAppcyberattacks,cybersecurity,data exposure,gmail,iran,Middle East,WhatsApp#hacking #campaign #targeted #highprofile #Gmail #WhatsApp #users #Middle #East1768587363

    Campaign cyberattacks cybersecurity data exposure East Gmail hacking highprofile iran Middle Middle East targeted Users WhatsApp
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    admin
    • Website
    • Tumblr

    Related Posts

    Can AI judge journalism? A Thiel-backed startup says yes, even if it risks chilling whistleblowers

    April 16, 2026

    AI learning app Gizmo levels up with 13M users and a $22M investment

    April 16, 2026

    Feds will require data centers to show their power bills

    April 16, 2026
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    January 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    January 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    January 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By admin
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By admin
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By admin
    Advertisement
    Demo
    iGadgets Tech
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Tech
    • Gadgets
    • Mobiles
    • Our Authors
    © 2026 ThemeSphere. Designed by WPfastworld.

    Type above and press Enter to search. Press Esc to cancel.