In a digital age where battles are increasingly fought behind screens, a new threat has emerged that blends artificial intelligence with cyber warfare. The Iranian state-backed hacking group APT35—also known as Charming Kitten—has ramped up its espionage efforts, and this time, they’re using AI to do it smarter, faster, and more convincingly.

And if you think you’re not a target — think again.

Cyber attacks are real. Shot of an unrecognisable hacker using a laptop in the dark.

🎯 What’s Happening: APT35’s AI-Powered Phishing Blitz

APT35 has launched a wave of sophisticated phishing attacks aimed primarily at Israeli journalists, academics, and cybersecurity professionals. What’s different this time? They’re using artificial intelligence to craft emails and messages that are frighteningly believable.

Here’s how it works:

  • Attackers impersonate tech assistants or researchers
  • They send personalized emails or WhatsApp messages
  • Victims are tricked into clicking on fake Google Meet or Gmail login pages
  • Credentials — even those protected with two-factor authentication — are harvested

This AI twist allows attackers to mimic writing styles, anticipate human responses, and tailor messages to each target, raising red flags across the global cybersecurity community.

🕵️‍♂️ APT35: Who Are They?

APT35 is no amateur outfit. Backed by Iran’s Islamic Revolutionary Guard Corps (IRGC), the group has a long track record of cyber espionage targeting high-value individuals and institutions. But now, they’re evolving—fast.

Their new AI-driven approach is not only more effective but also more difficult to detect. That’s what makes this campaign so dangerous.

🌍 The Bigger Picture: Iran and Israel’s Cyber Cold War

These attacks don’t exist in a vacuum. They’re part of an escalating digital arms race between Iran and Israel. After Israeli strikes on Iranian infrastructure, Tehran responded with cyberattacks targeting Israel’s critical sectors. On the flip side, Israeli hackers—like the infamous Predatory Sparrow—have retaliated by hitting Iranian banks and crypto exchanges, causing massive disruptions.

The battleground may be digital, but the impacts are very real—especially as tensions rise across the Middle East.

🌐 Global Ripple Effects

The U.S. has already issued warnings about possible Iranian cyber retaliation on American infrastructure. Meanwhile, cybersecurity analysts are watching closely as APT35 continues to refine its AI-based attacks. The fear? That this playbook could be copied by other state and non-state actors around the world.

🛡️ Frequently Asked Questions

Q: What makes these new APT35 attacks different?
A: AI-generated phishing messages are more personalized and convincing, making them harder to spot and more effective at stealing sensitive data.

Q: Who is most at risk?
A: High-profile professionals in journalism, cybersecurity, and academia—especially in Israel—are primary targets. But as tactics evolve, broader targets (including the general public) could follow.

Q: Can AI really write phishing emails that good?
A: Yes. AI can mimic human writing, adjust tone based on the recipient, and generate fake login pages that look nearly identical to real ones.

Q: How can I protect myself?
A: Use strong, unique passwords, enable two-factor authentication, avoid clicking suspicious links, and always verify the identity of unknown contacts—especially if something feels “off.”

Q: What does this mean for the future of cybersecurity?
A: It signals a shift. AI is no longer just a defensive tool—it’s now part of the attack strategy. Security protocols must adapt accordingly.

APT35’s new tactics are a wake-up call: AI isn’t just a buzzword. It’s already shaping the future of cyber warfare—and you could be the next link in the chain.

Stay alert. Stay secure. Because the next cyber war won’t wait for you to notice it’s started.

Hacker working on computer cyber crime

Sources The Hacker News