Gmail and WhatsApp Hacking Campaign Targets Middle East Activists
A wave of highly targeted phishing attacks has compromised the digital safety of activists, journalists, and dissidents across the Middle East—particularly those connected to Iran’s ongoing protests. Using deceptive WhatsApp messages and fake login pages mimicking Google services, attackers are harvesting Gmail credentials, hijacking WhatsApp accounts, and silently siphoning personal data like location, photos, and voice recordings. The campaign, which emerged in early January 2026, exploits both technical vulnerabilities and human trust during a period of intense political upheaval and internet blackouts in Iran.
Security researchers and affected individuals have confirmed that the operation is not random cybercrime—it’s precision-engineered surveillance. With victims’ data being stored on an unsecured server, investigators gained rare insight into the scale and sophistication of this threat. Here’s what we know so far.
How the Attack Unfolded: A Deceptive WhatsApp Message
The attack begins with a single WhatsApp message—often appearing to come from a trusted contact or organization. Recipients receive a link disguised as urgent news, protest updates, or official documentation related to Iran’s civil unrest. One Iranian activist based in the U.K., Nariman Gharib, received such a message and wisely refrained from clicking. Instead, he shared the link with cybersecurity experts for analysis.
That decision proved critical. The URL led to a near-perfect replica of Google’s sign-in page, complete with correct logos, language, and even SSL encryption—a detail many users mistakenly interpret as a sign of legitimacy. Once a victim enters their Gmail address and password, the phishing site captures the credentials and immediately redirects them to the real Google login page to avoid suspicion. In parallel, the site requests permissions to access WhatsApp Web, enabling full account takeover if the user scans the QR code.
Inside the Phishing Infrastructure: An Open Server Full of Victims’ Data
What made this campaign especially alarming was the attackers’ operational oversight: their command-and-control server was left completely unsecured. Anyone with the right URL could view real-time logs of every victim who entered their credentials. TechCrunch’s analysis, corroborated by independent security researchers, revealed dozens of compromised accounts—many belonging to individuals with direct ties to Iranian activism, journalism, or humanitarian work.
The exposed server didn’t just store usernames and passwords. It also collected meta device types, IP addresses, browser fingerprints, and timestamps. Some entries even included geolocation data pulled from mobile devices, suggesting the phishing page attempted to activate background tracking features once loaded. Audio and image files uploaded through WhatsApp were also at risk, as the attackers leveraged session hijacking to maintain persistent access.
This level of data collection points to more than financial gain—it suggests intelligence gathering, possibly by state-aligned actors.
Why Iran-Linked Users Are in the Crosshairs
Iran is currently experiencing its most severe internet shutdown since the 2019 protests, with nationwide blackouts lasting weeks. During such outages, diaspora communities and exiled activists become vital information conduits, using encrypted apps like WhatsApp and Signal to coordinate and share updates. Their digital footprints make them high-value targets.
Cyber operations against Iranian dissidents are not new. Both Iranian state hackers and foreign intelligence agencies have long waged digital campaigns to infiltrate opposition networks. But this latest effort stands out for its timing, social engineering finesse, and multi-platform reach—simultaneously targeting email (for long-term access) and messaging apps (for real-time intelligence).
Experts note that the phishing kit used in this campaign shares code similarities with tools previously linked to groups operating in the region, though definitive attribution remains elusive. Whether orchestrated by Tehran, a rival nation, or a mercenary spyware vendor, the outcome is the same: compromised identities and silenced voices.
Technical Red Flags You Can Spot
While the phishing page was convincing, it wasn’t flawless. Security-conscious users might have noticed subtle discrepancies:
- The URL, though HTTPS-enabled, used a domain name unrelated to Google (e.g., “google-verify[.]xyz” instead of “accounts.google.com”).
- The page requested unusual permissions, such as continuous access to microphone or location—even before login.
- After entering credentials, some users reported delayed WhatsApp sync issues or unexpected logout prompts, signs of session cloning.
Still, these clues are easy to miss under stress—especially when receiving what appears to be time-sensitive information about loved ones in a crisis zone. That’s why human factors remain the weakest link in digital security.
What Victims Should Do Immediately
If you suspect you’ve interacted with a suspicious link—especially one received via WhatsApp during the past two weeks—take action now:
- Change your Gmail password immediately and enable two-factor authentication (2FA) using an authenticator app or hardware key, not SMS.
- Log out of all active sessions in your Google Account settings.
- Revoke WhatsApp Web access by going to WhatsApp > Linked Devices and removing any unrecognized sessions.
- Scan your device for malware using a reputable mobile security tool.
- Notify your contacts—your compromised account may already be used to spread the phishing link further.
For high-risk users—activists, journalists, or NGO workers—consider consulting a digital safety organization for a full threat assessment. Proactive measures like using burner accounts for sensitive communications can also reduce exposure.
Digital Safety in Times of Crisis
This campaign underscores a harsh reality: during political turmoil, your inbox and messaging apps become battlegrounds. Adversaries don’t just monitor public posts—they infiltrate private channels to disrupt, intimidate, and gather intelligence. And as internet shutdowns become more common, reliance on encrypted apps grows, making them prime targets.
Yet awareness is a powerful defense. Simple habits—like never clicking links in unsolicited messages, verifying sender identities through alternate channels, and regularly auditing app permissions—can thwart even sophisticated attacks.
Governments and tech platforms also bear responsibility. Google and Meta must continue hardening their ecosystems against session hijacking and credential theft. Meanwhile, policymakers should treat digital surveillance during civil unrest as a human rights issue—not just a cybersecurity problem.
Staying Ahead of the Next Wave
Cybersecurity researchers warn this is likely just the first phase. As protests evolve and international attention shifts, attackers may pivot to new lures: fake donation pages, forged legal notices, or AI-generated voice calls impersonating family members. The tactics will change, but the goal remains constant: exploit urgency, trust, and fear.
For now, the best shield is skepticism paired with preparation. Verify before you click. Assume every unsolicited message is a potential trap. And remember: in the digital age, protecting your data isn’t just about privacy—it’s about preserving your voice in moments when it matters most.
As the situation in Iran continues to unfold, the global community must recognize that digital safety is inseparable from physical safety. And for those on the front lines—whether in Tehran or London—the battle for truth is being fought not just in the streets, but in every inbox and chat thread.