APT35 Hackers Targeting Government and Military to Steal Login Credentials


Stormshield CTI researchers have identified two active phishing servers linked to APT35, revealing ongoing credential-stealing operations targeting government and military entities.

In an active threat-hunting operation, Stormshield’s Cyber Threat Intelligence (CTI) team discovered two malicious servers exhibiting hallmark characteristics of APT35 infrastructure.

These servers, mirroring footprints documented by Check Point, are hosting phishing pages designed to harvest login credentials from government, military, academic, and media organizations across the US, Middle East, and Europe.

The investigation began by examining an HTML page spotlighted in Check Point’s recent report on APT35 (also known as Mint Sandstorm, Charming Kitten, or Educated Manticore), an Iran-linked espionage group active since at least 2015.

The simple page displays four colored dots and loads identical JavaScript and CSS files from varying paths on different domains.

Query results in SilentPush UI.

Stormshield analysts leveraged this unique page structure to craft an html_body_ssdeep query on the SilentPush threat-hunting platform, enabling the rapid identification of similarly configured pages across the internet.

Identified Servers and Domains

Using the crafted query, the CTI team found eight matches associated with the IPv4 addresses 45.143.166[.]230 and 195.66.213[.]132, previously reported by Check Point. Additionally, two previously undocumented IPs emerged:

  • 84.200.193[.]20 (AS214036 Ultahost, Inc.) mapped to domains resolving mostly between early and mid-July 2025, with only one active domain remaining—rohan63[.]xyz.
  • 79.132.131[.]184 (AS39378 SERVINGA) hosts 49 “.online” domains, all still resolving, many spoofing video-conferencing services such as meet.go0gle[.]online and meet.video-connect[.]online. The latest registration—proof-video[.]online—went live on September 20, 2025.

These domains act as credential-phishing frontends, masquerading as legitimate government or military collaboration tools. Video conferencing themes have been central to APT35’s phishing tactics since 2023, according to Google threat analysts.

Hosting timeline for IPv4 84.200.193[.]20, source: Validin.
Hosting timeline for IPv4 84.200.193[.]20, source: Validin.

Further investigation uncovered tracking behaviors embedded in URL query parameters. A VirusTotal search for “entity:url url:online/?invitation” yielded multiple URLs submitted from Sweden and Israel between July and September 2025, all following an “invitation-” pattern.

Subdomain enumeration using “entity:domain domain:viliam.*” returned 112 “viliam.” subdomains, providing an effective method to discover new phishing sites potentially linked to this campaign.

Mitigations

The persistence of these servers and subdomain patterns indicates APT35’s continued focus on credential theft within sensitive sectors. Their reliance on predictable HTML templates and subdomain naming conventions offers defenders a reliable approach to detection:

  • Template fingerprinting: Query for the distinct four-dot HTML page across internet scan platforms.
  • Subdomain pattern monitoring: Watch for new “viliam.” prefixed domains resolving to suspicious IPv4s.
  • Phishing URL parameter searches: Track “?invitation-” query strings on “.online” domains via VirusTotal.

Stormshield has proactively blocked all identified indicators across its security products, safeguarding customers from these phishing infrastructures.

Nonetheless, government and military security teams should integrate these hunting techniques into their threat intelligence processes to detect and disable emerging APT35 assets before they can harvest credentials.

APT35’s phishing campaign targeting government and military organizations remains active and largely unchanged since the Check Point report.

While their tactics are straightforward, the predictability of their infrastructure can be leveraged by defenders to rapidly identify and neutralize malicious domains.

Security teams monitoring video-conference themed phishing, “viliam.” subdomains, and “invitation” URL queries can stay ahead of APT35’s credential-stealing efforts, protecting critical credentials from falling into adversary hands.

Indicator of compromises

ValueTypeCommentConfidence
79.132.131[.]184IPV4IPv4 hosting phishing domainsHigh
84.200.193[.]20IPV4IPv4 hosting phishing domainsHigh
viliam-live-identity[.]onlineDomainPhishing domainHigh
viliam.viliam-live-identity[.]onlineDomainPhishing domainHigh
proof-video[.]onlineDomainPhishing domainHigh
look-together-online[.]onlineDomainPhishing domainHigh
meet.proof-video[.]onlineDomainPhishing domainHigh
www.look-together-online[.]onlineDomainPhishing domainHigh
viliam.look-together-online[.]onlineDomainPhishing domainHigh
www.video-connect[.]onlineDomainPhishing domainHigh
meet.video-connect[.]onlineDomainPhishing domainHigh
video-connect[.]onlineDomainPhishing domainHigh
www.go0gle[.]onlineDomainPhishing domainHigh
meet.go0gle[.]onlineDomainPhishing domainHigh
go0gle[.]onlineDomainPhishing domainHigh
tensore[.]onlineDomainPhishing domainHigh
ell-safe[.]onlineDomainPhishing domainHigh
azdava[.]onlineDomainPhishing domainHigh
meet.azdava[.]onlineDomainPhishing domainHigh
meet.ell-safe[.]onlineDomainPhishing domainHigh
viliam.azdava[.]onlineDomainPhishing domainHigh
viliam.tensore[.]onlineDomainPhishing domainHigh
viliam.teslator[.]onlineDomainPhishing domainHigh
teslator[.]onlineDomainPhishing domainHigh
viliam.kuret-live[.]onlineDomainPhishing domainHigh
kuret-live[.]onlineDomainPhishing domainHigh
book.kuret-live[.]onlineDomainPhishing domainHigh
viliam.safe-lord[.]onlineDomainPhishing domainHigh
safe-lord[.]onlineDomainPhishing domainHigh
www.p-safe[.]onlineDomainPhishing domainHigh
viliam.p-safe[.]onlineDomainPhishing domainHigh
p-safe[.]onlineDomainPhishing domainHigh
into-support[.]onlineDomainPhishing domainHigh
villiam[.]online-speak[.]onlineDomainPhishing domainHigh
viliam[.]online-speak[.]onlineDomainPhishing domainHigh
online-speak[.]onlineDomainPhishing domainHigh
viliam.into-support[.]onlineDomainPhishing domainHigh
viliam.alpha-met[.]onlineDomainPhishing domainHigh
alpha-met[.]onlineDomainPhishing domainHigh
viliam.kuret-met[.]onlineDomainPhishing domainHigh
viliam.live-board[.]onlineDomainPhishing domainHigh
live-board[.]onlineDomainPhishing domainHigh
www.owner-rate[.]onlineDomainPhishing domainHigh
viliam.owner-rate[.]onlineDomainPhishing domainHigh
owner-rate[.]onlineDomainPhishing domainHigh
viliam.alpha-meet[.]onlineDomainPhishing domainHigh
alpha-meet[.]onlineDomainPhishing domainHigh
arcanet[.]onlineDomainPhishing domainHigh
viliam.arcanet[.]onlineDomainPhishing domainHigh
viliam.cppsg[.]onlineDomainPhishing domainHigh
cppsg[.]onlineDomainPhishing domainHigh
rohand63[.]xyzDomainPhishing domainHigh
www.rohand63[.]xyzDomainPhishing domainHigh
viliam.rohand63[.]xyzDomainPhishing domainHigh
robinthing123[.]onlineDomainPhishing domainHigh
viliam.robinthing123[.]onlineDomainPhishing domainHigh
viliam.superlite[.]onlineDomainPhishing domainHigh
superlite[.]onlineDomainPhishing domainHigh
dmn-inter[.]onlineDomainPhishing domainHigh
viliam.dmn-inter[.]onlineDomainPhishing domainHigh
www.toolfare[.]onlineDomainPhishing domainHigh
viliam.toolfare[.]onlineDomainPhishing domainHigh
toolfare[.]onlineDomainPhishing domainHigh
oranus.besatoo[.]onlineDomainPhishing domainHigh
viliam.besatoo[.]onlineDomainPhishing domainHigh
mickel.besatoo[.]onlineDomainPhishing domainHigh
live.besatoo[.]onlineDomainPhishing domainHigh
besatoo[.]onlineDomainPhishing domainHigh

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link