Iranian Hacking Group APT42 Targets Trump Campaign

Iranian hacking group APT42 is implicated in targeting the U.S. presidential campaign of Donald Trump. Known for its invasive surveillance tactics, including installing malware on mobile phones, this group is believed to be linked to Iran's Intelligence Organization of the Islamic Revolutionary Guard Corps (IRGC-IO). The group's activities have raised concerns about espionage and physical threats.


Devdiscourse News Desk | Updated: 23-08-2024 15:33 IST | Created: 23-08-2024 15:33 IST
Iranian Hacking Group APT42 Targets Trump Campaign

An Iranian hacking team, identified as APT42 or CharmingKitten, has infiltrated the campaign of Republican presidential candidate Donald Trump. Their espionage tactics include installing surveillance software on victims' mobile phones to record calls, steal texts, and activate cameras and microphones. Experts note the group's ties to the Islamic Revolutionary Guard Corps' Intelligence Organization (IRGC-IO).

APT42 has a history of targeting people of interest, including Iranian activists who faced imprisonment or threats after being hacked. The group's presence in the U.S. election is significant due to its sophisticated approach and high-value targets. Despite denials from Iran's mission to the United Nations, cybersecurity analysts warn of the group's dangers.

Levi Gundert of Recorded Future describes APT42 as a formidable security entity within Iran, alongside the Quds Force. The hackers often impersonate journalists and use social engineering to lure targets into opening malicious emails. Their focus includes anti-Iran activists, Middle Eastern academics, and Western government officials, heightening concerns for physical and digital security.

(With inputs from agencies.)

Give Feedback