Iranian Hackers Posed as Israelis in Targeted LinkedIn Phishing Attack

The Israeli security agency Shin Bet claims to have thwarted a LinkedIn phishing scam carried out by Iranian hackers.


  1. The phishing attack targeted Israeli researchers and civil servants.
  2. The scammers engaged in conversations to send malware files.
  3. The campaign has been thwarted by the Israeli security agency, Shin Bet.

The ongoing cyber war between Iran and Israel has once again made headlines, as the Israeli internal intelligence agency, Shin Bet, successfully foiled a sophisticated spear-phishing attack targeted at Israeli users, particularly researchers and civil servants from various organizations.

The attack, carried out apparently by state-backed hackers from Iran, utilized fake LinkedIn profiles and sophisticated social engineering techniques to gain unauthorized access to Israeli citizens’ computers and steal sensitive information.

Citing i24news, Shin Bet revealed that the modus operandi of the Iranian hackers involved creating fake profiles, impersonating real Israeli citizens, and initiating conversations on LinkedIn before continuing the communication via email. This approach allowed the hackers to establish trust and credibility, making it easier to convince the targets to open attachments or click on links.

During the conversation, the malicious actors would send seemingly harmless attachments, such as invitations to conferences or files related to the targets’ professional interests, such as studies or articles.

Unbeknownst to the recipients, these attachments contained malware that, once opened, infected their computers. This malware granted the Iranian hackers full access privileges, enabling them to remotely take over the infected devices and access all stored information.

Chat screenshot (Credit: i24NEWS English)

The Iranian cyber attackers were cunning in their preparation, gathering information for their fake LinkedIn profiles from various social media networks. By doing so, they could create connections based on shared interests and past interactions, making the phishing campaign more convincing and difficult to detect.

This incident is not the first time that Israeli citizens have faced targeted phishing attacks. In the past, hackers have employed various tactics, including spear-phishing email campaigns containing malware disguised as explicit content. These sophisticated attacks aim to exploit human curiosity and emotions, enticing unsuspecting users into opening dangerous files.

As cyber warfare continues to escalate, nations and organizations must remain vigilant against such threats. Experts in the cybersecurity field advise users to exercise caution when engaging with unknown contacts, even on professional platforms like LinkedIn. It is crucial to verify the authenticity of profiles and refrain from opening attachments or clicking on links from suspicious sources.

Additionally, organizations and individuals are encouraged to keep their systems and software up-to-date, use reliable antivirus software, and regularly back up critical data to mitigate the impact of potential cyberattacks.

The battle between Iran and Israel in cyberspace is a reminder that the digital landscape is becoming an increasingly contested and complex arena. Governments and institutions worldwide must join forces to counter and defend against these state-sponsored cyber threats, as the consequences of such attacks can have far-reaching implications on national security and individual privacy.

  1. Hamas hacked smartphones of over 100 IDF soldiers
  2. US Charges 3 Iranian Hackers Over Ransomware Attacks
  3. Iranians Drop RatMilad Android Spyware Mimicking a VPN App
  4. Hamas hackers posed as women to con IDF into downloading malware
  5. Hackers Posed as Women to Con Israeli Officials into Installing Malware
Related Posts