DMR News

Advancing Digital Conversations

Phishing Campaign Targets Iran-Linked Activists Through WhatsApp Amid Internet Shutdown

ByJolyen

Jan 19, 2026

Phishing Campaign Targets Iran-Linked Activists Through WhatsApp Amid Internet Shutdown

A coordinated phishing campaign targeting people involved in Iran-related activism and research has been uncovered after a UK-based Iranian activist received a suspicious WhatsApp message containing a malicious link. Technical analysis of the campaign shows it was designed to steal email and messaging credentials and, in some cases, enable surveillance by accessing victims’ location, audio, and camera data.

Warning From An Activist And Initial Discovery

On Tuesday, Nariman Gharib, an Iranian activist based in the UK, posted redacted screenshots on X showing a phishing link sent to him via WhatsApp. Gharib warned others not to click on suspicious links and said the campaign appeared to target individuals involved in Iran-related activities.

The activity comes as Iran faces the longest nationwide internet shutdown in its history, during ongoing anti-government protests and violent crackdowns. Iran and its regional adversaries are known to be active in offensive cyber operations, prompting closer examination of the campaign.

Gharib later shared the full phishing link and a technical write-up with TechCrunch, allowing reporters to obtain the source code of the phishing page used in the attack.

What The Phishing Infrastructure Revealed

Analysis of the phishing page source code, combined with input from independent security researchers, indicated the campaign was designed to steal Gmail and other online account credentials, compromise WhatsApp accounts, and potentially collect sensitive surveillance data.

The attackers used a dynamic DNS provider, DuckDNS, to host links that appeared legitimate. Dynamic DNS services allow attackers to mask the real location of servers by routing traffic through changing IP addresses tied to simple web addresses. The phishing content itself was hosted on a separate domain, alex-fabow.online, first registered in early November 2025.

Related domains hosted on the same server followed naming patterns suggesting additional targeting of online services, including virtual meeting platforms. It remains unclear whether the phishing infrastructure was shut down voluntarily or disabled by DuckDNS. The service’s owner asked that an abuse report be filed when contacted.

Exposed Server And Victim Data

A flaw in the phishing setup allowed TechCrunch to access a server-side file that stored responses from victims. The file was accessible without authentication and contained more than 850 records showing how victims interacted with the phishing flow.

The data included usernames, passwords, incorrect login attempts, and two-factor authentication codes, effectively functioning as a keylogger. It also logged user agent data, showing the campaign targeted users across Windows, macOS, iPhone, and Android devices.

The exposed records showed step-by-step credential theft, including cases where victims entered Gmail passwords multiple times until successful, followed by submission of two-factor codes sent via text message.

Identified victims included a Middle Eastern academic in national security studies, the head of an Israeli drone manufacturer, a senior Lebanese cabinet minister, at least one journalist, and individuals in or linked to the United States.

WhatsApp Account Takeover And Surveillance Features

In Gharib’s case, clicking the link opened a fake WhatsApp-themed page displaying a QR code. The page attempted to trick the victim into scanning the code, which would link their WhatsApp account to an attacker-controlled device. This method abuses WhatsApp’s legitimate device-linking feature and has previously been used against Signal users.

Security researcher Runa Sandvik, founder of Granitt, reviewed the phishing code and found it also requested browser permissions to access geolocation, microphone, and camera functions. If granted, the code would transmit real-time location data to the attacker and repeatedly update it every few seconds. The page could also capture audio recordings and photos at short intervals.

Although the code enabled these capabilities, TechCrunch did not find evidence that location data, audio, or images had been stored on the exposed server.

Who May Be Behind The Campaign

The identity of the attackers remains unclear. Fewer than 50 confirmed victims were identified, spanning activists, academics, business leaders, and officials across the Iranian diaspora and the Middle East.

Gary Miller, a researcher at Citizen Lab, said the campaign showed hallmarks associated with spearphishing operations linked to Iran’s Islamic Revolutionary Guard Corps, including targeted credential theft, abuse of messaging platforms, and international victim selection.

Other researchers noted that financially motivated cybercriminals could also use stolen credentials for fraud or data theft, though the apparent focus on location tracking and media access is unusual for purely financial crime.

Ian Campbell, a threat researcher at DomainTools, said the domains involved were registered weeks or months before the protests intensified and assessed them as medium to high risk, consistent with organized cybercrime infrastructure. He added that Iran has previously outsourced cyber operations to criminal groups to obscure state involvement.

Ongoing Risks And Broader Context

The campaign’s timing, targets, and technical design point to a high-risk environment for individuals connected to Iran-related activism and research, particularly during periods of information blackout. Researchers warned the operation could reappear using similar infrastructure.

As Miller noted, unsolicited WhatsApp links, regardless of how convincing they appear, represent a significant security risk.


Featured image credits: Pixahive

For more stories like it, click the +Follow button at the top of this page to follow us.

Jolyen

As a news editor, I bring stories to life through clear, impactful, and authentic writing. I believe every brand has something worth sharing. My job is to make sure it’s heard. With an eye for detail and a heart for storytelling, I shape messages that truly connect.

Leave a Reply

Your email address will not be published. Required fields are marked *