Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

A hacking campaign targeting prominent Gmail and WhatsApp users across the Middle East

January 16, 2026

Iran's internet shutdown becomes longest in history as protests continue

January 15, 2026

Tiger Global loses Indian tax case related to Walmart-Flipkart deal, dealing blow to offshore strategy

January 15, 2026
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    Bitfinex hacker Ilya Lichtenstein appreciates President Trump's early release

    January 3, 2026

    According to data, hackers stole over $2.7 billion in cryptocurrencies in 2025

    December 23, 2025

    Coinbase resumes user onboarding in India, plans to introduce fiat currency next year

    December 7, 2025

    New report examines how David Sachs benefits from Trump administration role

    November 30, 2025

    Why Benchmark made a rare crypto bet on trading app Fomo with $17 million Series A

    November 6, 2025
  • Security

    A hacking campaign targeting prominent Gmail and WhatsApp users across the Middle East

    January 16, 2026

    Iran's internet shutdown becomes longest in history as protests continue

    January 15, 2026

    Billion-scale AI security issues that enterprises cannot ignore

    January 14, 2026

    AI security company DepthFirst announces $40 million Series A

    January 14, 2026

    US freight technology company puts its shipping system and customer data on the web

    January 14, 2026
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Tiger Global loses Indian tax case related to Walmart-Flipkart deal, dealing blow to offshore strategy

    January 15, 2026

    Blackstone, General Atlantic-backed Liftoff Mobile IPO Files

    January 14, 2026

    Why venture capitalists think consumer AI isn't living up to the hype

    January 13, 2026

    Superorganism raises $25 million to support biodiversity startups

    January 13, 2026

    These Gen Zers raised $11.75 million to put Africa's defense back into African hands.

    January 12, 2026
TechBrunchTechBrunch

A hacking campaign targeting prominent Gmail and WhatsApp users across the Middle East

TechBrunchBy TechBrunchJanuary 16, 202610 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


On Tuesday, UK-based Iranian activist Nariman Gharib tweeted an edited screenshot of a phishing link sent to him via a WhatsApp message.

“Don't click on suspicious links,” Ghalib warned. The activist, who follows the digital aspects of Iran's protests from afar, said the campaign targets people like himself who are involved in Iran-related activities.

The hacking operation comes as Iran grapples with its longest nationwide internet shutdown in its history, amid escalating anti-government protests and violent crackdowns across the country. Given that Iran and its closest adversaries are very active in offensive cyberspace (i.e. hacking people), we wanted to know more.

Gharib shared the full phishing link with TechCrunch shortly after posting, allowing us to capture a copy of the source code of the phishing web page used in the attack. He also shared an article summarizing his findings.

TechCrunch analyzed the phishing page's source code and added information from security researchers to believe that the campaign aimed to steal Gmail and other online credentials, compromise WhatsApp accounts, and conduct surveillance by stealing location data, photos, and voice recordings.

However, it is unclear whether the hackers are government agents, spies, cybercriminals, or all three.

TechCrunch also identified a way to view a real-time copy of all victim responses stored on the attacker's servers. This copy remains public and can be accessed without a password. This data revealed dozens of victims who unknowingly entered their credentials into phishing sites and were likely subsequently hacked.

The list also includes Middle Eastern scholars working on national security studies. CEO of an Israeli drone manufacturer. A senior Lebanese minister. At least one journalist. People who reside in the United States or have a United States phone number.

TechCrunch is publishing its findings after verifying many of Gharib's reports. The phishing site is currently closed.

Inside the attack chain

According to Ghalib, the WhatsApp message he received contained a suspicious link that loaded a phishing site on the victim's browser.

Two screenshots of WhatsApp messages are displayed side by side, showing a malicious link to whatsapp-meeting.duckdns.org.Image credit: Nariman Gharib

The link indicates that the attackers are relying on a dynamic DNS provider called DuckDNS in their phishing campaigns. A dynamic DNS provider allows you to connect an easy-to-remember web address (in this case, the duckdns.org subdomain) to servers whose IP addresses may change frequently.

It is unclear whether the attackers took down the phishing site of their own accord, or whether they were caught and blocked by DuckDNS. We contacted DuckDNS, but its owner, Richard Harper, requested that we submit a report of abuse on his behalf.

From what we understand, the attackers used DuckDNS to mask the actual location of the phishing page, possibly making it look like a genuine WhatsApp link.

The phishing page was actually hosted on the domain alex-fabow.online, which was first registered in early November 2025. This domain has several other related domains hosted on the same dedicated server, and these domain names follow a pattern, suggesting that the campaign also targeted other providers of virtual meeting rooms, such as meet-safe.online and whats-login.online.

We don't know what happens when a DuckDNS link loads in a victim's browser, or how the link determines which specific phishing page to load. DuckDNS links can redirect targets to specific phishing pages based on information collected from the user's device.

Phishing pages are not loaded in your web browser, so you cannot interact with them directly. However, by reading the page's source code, we were able to better understand how the attack worked.

Gmail credentials and phone number phishing

Depending on the target, tapping a phishing link opens a fake Gmail login page or requests a phone number, starting an attack flow aimed at stealing passwords and two-factor authentication codes.

However, there was at least one flaw in the source code of the phishing page's code. TechCrunch discovered that by changing the URL of the phishing page in a web browser, it is possible to view a file on the attacker's server that stores a record of all victims who have entered their credentials.

This file contained over 850 records of information submitted by victims during the attack flow. These records detailed each part of the phishing flow in which the victim engaged. This included a copy of the username and password that the victim had entered into the phishing page, as well as the false entry and its two-factor code, which effectively acted as a keylogger.

The records also included a text string that identified each victim's user agent, the operating system and browser version used to view the website. This data shows that the campaign was designed to target Windows, macOS, iPhone, and Android users.

The exposed files allow us to follow the attack flow step by step, victim by victim. In one case, the published files show that the victim clicked on a malicious link, which opened a page that resembled a Gmail sign-in window. The logs show victims entering their email credentials several times before entering the correct password.

The recording shows the same victim entering a two-factor authentication code sent via text message. This is because Google sends two-factor codes in a specific format, typically G-xxxxxx, which features a six-digit numeric code.

WhatsApp hijacking and browser data leakage

Beyond credential theft, the campaign appears to enable surveillance by tricking victims into sharing their device location, audio, and photos.

In Ghalib's case, tapping the link in the phishing message opened a fake WhatsApp-themed page in his browser and displayed a QR code. This lure is designed to trick targets into scanning a code on their device and accessing a virtual meeting room.

A stream of records published by the attacker's server. Shows a set of attack flow data, such as sign-ins and password entries on phishing pages.Image credit: TechCrunch

Ghalib said the QR code is generated by the attacker and when scanned or tapped, the victim's WhatsApp account is instantly linked to the attacker-controlled device, granting access to the victim's data. This is a long-known attack technique that exploits WhatsApp's device linking feature, and has been similarly exploited to target users of the messaging app Signal.

We asked Runa Sandvik, founder of Granitt and a security researcher who helps protect the safety of at-risk individuals, to examine a copy of the phishing page's code to see how it works.

Sandvik discovered that when the page loads, the code triggers a browser notification asking the user for permission to access their location (via navigator.geolocation) and photo and audio (navigator.getUserMedia).

If accepted, the browser instantly sends the person's coordinates to the attacker, allowing them to locate the victim. The page then continues to share the victim's location data every few seconds as long as the page is open.

The code also allowed the attacker to use the device's camera to record bursts of audio and take photos every 3 to 5 seconds. However, we did not see any location data, audio, or images collected on the server.

Thoughts on victimhood, timing, and attribution

We don't know who is behind this campaign. What is clear is that this campaign was successful in stealing credentials from victims, and phishing campaigns may resurface.

Although the identities of some of the people in this targeted victim population are known, there is not enough information to understand the nature of the campaign. The number of victims hacked by this campaign (as far as we know) is quite small, less than 50. And it has affected both seemingly ordinary people in the Kurdish community, as well as academics, government officials, business leaders, and other senior figures in the broader Iranian diaspora and the Middle East.

There may be many more victims than we realize, and that could help us understand who was targeted and potentially why.

Cases in which this may be a government-sponsored attacker

It is unclear what motivated the hackers to steal people's credentials and hijack their WhatsApp accounts, but this could also help identify those behind this hacking operation.

For example, a government-backed group could steal the email passwords and two-factor codes of high-value targets such as politicians and journalists, allowing them to download personal and sensitive information.

This may come as no surprise since Iran is currently almost completely cut off from the outside world, making it a challenge to obtain information both domestically and internationally. Both the Iranian government and foreign governments with an interest in Iranian affairs would understandably want to know with whom and how influential individuals associated with Iran are communicating.

Therefore, given the timing of this phishing campaign and who is being targeted, it may be an espionage operation aimed at gathering information about a limited number of people.

We also asked Gary Miller, a security researcher and mobile espionage expert at Citizen Lab, to examine the phishing code and some of the data leaked from the attackers' servers.

Mr Miller said the attack was “certain”. [had] Miller referred to targeted email hacks carried out by the Iranian Islamic Revolution Guards Corps (IRGC), a faction of the Iranian military known for carrying out cyber-attacks, and pointed to a variety of indicators, including the international scope of targeting victims, theft of credentials, abuse of popular messaging platforms such as WhatsApp, and social engineering techniques used in phishing links.

When there is a possibility that the person is acting for financial reasons

Meanwhile, a financially motivated hacker could use the same stolen Gmail password and a two-factor code from another high-value target, such as a company executive, to steal sensitive business information from your inbox. Hackers can also forcefully reset victims' crypto and bank account passwords and empty their wallets.

However, the campaign's focus on accessing victims' location and device media is unusual for a financially motivated attacker, and photos and audio recordings may be rarely used.

We asked Ian Campbell, a threat researcher at DomainTools, who helps analyze public internet records, to examine the domain names used in campaigns to understand when they were first established and whether these domains were connected to other previously known or identified infrastructure.

Campbell discovered that while the campaign was targeting victims during ongoing protests across Iran, the infrastructure had been in place weeks earlier. He added that most of the domains associated with this campaign were registered in early November 2025, and one of the associated domains was created several months earlier, in August 2025. Campbell described these domains as medium to high risk and said they appeared to be associated with financially motivated cybercriminal activity.

Even more troubling, the Iranian government is known to outsource cyberattacks to criminal hacking groups, presumably to protect its involvement in hacking operations against its citizens. The U.S. Treasury Department has in the past sanctioned Iranian companies that acted as vanguards for Iran's Revolutionary Guards and conducted cyberattacks such as targeted phishing and social engineering attacks.

“This shows that clicking on unsolicited WhatsApp links, no matter how convincing, is a risky and unsafe activity,” Miller said.

To contact this reporter securely, use Signal using username zackwhittaker.1337.

Lorenzo Franceschi-Bicchierai contributed reporting.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Iran's internet shutdown becomes longest in history as protests continue

January 15, 2026

Billion-scale AI security issues that enterprises cannot ignore

January 14, 2026

AI security company DepthFirst announces $40 million Series A

January 14, 2026

US freight technology company puts its shipping system and customer data on the web

January 14, 2026

How WitnessAI raised $58 million to solve enterprise AI's biggest risks

January 14, 2026

Man pleads guilty to hacking US Supreme Court filing system

January 13, 2026

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

A hacking campaign targeting prominent Gmail and WhatsApp users across the Middle East

January 16, 2026

Iran's internet shutdown becomes longest in history as protests continue

January 15, 2026

Tiger Global loses Indian tax case related to Walmart-Flipkart deal, dealing blow to offshore strategy

January 15, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2026 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.