
Since the escalation of conflict involving Israel, the US and Iran, Bitdefender Antispam Labs has detected a sustained increase in phishing and malware campaigns targeting Gulf countries.
The data shows a clear inflection point starting Feb. 28.
Before that, phishing activity fluctuated. Afterward, the pattern changes:
After Feb. 28, phishing and malware emails targeting Gulf countries surged and stayed elevated. Within days, activity doubled, and at peak reached nearly four times the baseline levels, signaling a sustained and coordinated spike rather than a one-off campaign.
This clearly suggests that phishing and malware delivery campaigns are being deployed and adjusted in real time, with attackers capitalizing on heightened regional sensitivity and business disruptions.
The emails are tailored to match real-world workflows in the region. Across the samples provided by Bitdefender Antispam Lab research Viorel Zavoiu, we noticed several recurring themes:
Banking and financial operations
Attackers impersonate bank representatives, referencing:
These emails often include realistic signatures and corporate formatting.
Shipping and delivery notifications
Victims are told:
The messages create a sense of urgency while appearing routine.
Contracts and government communication
Some emails mimic ministry, legal or official notices referencing contracts, case files or urgent documentation.
Account verification requests
In some analyzed samples, recipients are pressured with messages like:





Now for the really bad part: malicious attachments
Some of the analyzed phishing emails hide malicious payloads that give attackers access to users’ systems.
One campaign uses a simple but effective trick: a fake invoice email written in Arabic.
The email contains this text (translated from Arabic)
" Hello Sir/Madam, I was pleased to get in touch with you regarding our upcoming project. I am looking forward to starting the work! You will find the preliminary invoice for the project attached. Once the payment is confirmed, I will begin the first phase of work immediately. Please do not hesitate to ask any questions you may have! Sent from my iPhone”
According to Bitdefender researcher Mihnea George Bejinaru, the attachment is not a real invoice at all, but a Java-based executable (JAR) linked to the STRRAT malware family.
The attachment is also heavily obfuscated—a strong sign of malicious intent. Obfuscation means the malware authors intentionally made the code hard to read and analyze. In this case, the archive contains many dummy .class files with meaningless instructions, apparently added to confuse analysts and slow down detection. There is also a config.txt resource containing a base64-encoded blob that appears to hide configuration data. That hidden config likely stores important instructions such as command-and-control information, operational settings, or fallback infrastructure.
Another trick the malware uses is visual deception. When launched, it displays a GUI pretending to be “Allatori Obfuscator v9.4 DEMO.” That fake interface helps make the file seem like some legitimate Java utility or software tool instead of malware. This type of disguise is meant to dodge suspicion and buy time while the malicious code runs in the background.
One of the clearest forms of malicious behavior is persistence. The sample copies itself into multiple locations on the system, including startup folders, so it can launch again every time the computer reboots. That means that even if the user closes the program, the infection is not necessarily gone. The malware appears to place copies under roaming application data and Windows startup paths, which is a common persistence technique. There is also evidence that it may create a scheduled task named “Skype” that runs every 30 minutes. That is another tactic to ensure the malware survives reboots and keeps relaunching itself even if one persistence method fails.
The behavior also strongly suggests command-and-control communication. The malware connects to suspicious infrastructure, including domains that reference the current geopolitical conflict, with names such as usaisraeliranwar and iranwarusa. These domain names are notable because they appear to tie the campaign’s lure or operational theme to the Middle East conflict. Whether that theme is meant to reflect attacker intent, opportunistic branding, or social engineering context, it is clearly not random.
Once opened, it:
Another campaign takes a stealthier approach under the guise of a professional business conversation. It tries to look like part of an ongoing professional conversation. The subject line references financing, bank guarantees, and project discussions. The sender impersonates a bank representative from Saudi Awwal Bank, complete with a realistic signature, job title, office location, and contact details.
Here’s a machine-translated version of the message:
“Dear [redacted]
As discussed, the request under process for obtain the approval. I suggest issuing the LG from your SAB account, and once the request is approved, we will shift the LG under the facility line and refund the margin of 80% to your account. Pls find the attached.”
The attachment is .rar archive containing an HTA file. This is already a huge red flag. An HTA (HTML Application) file is not just a document—it can run scripts directly on a Windows system with fewer restrictions than a normal web page. In simple terms, opening it is like running a program.
Inside this HTA file, the code is heavily obfuscated. Instead of readable commands, it contains thousands of lines filled with strange, repeated characters. This is a deliberate technique to hide the real behavior from security tools and analysts.
The script uses a trick where it inserts a junk delimiter string throughout the code, then removes it at runtime to reconstruct the actual command. This allows the malicious logic to stay hidden until the moment it is executed.
When executed, it triggers a multi-stage attack:
This type of attack is especially dangerous because it:
The use of business-themed lures (bank guarantees, financing, project approvals) strongly suggests the attackers are targeting companies, finance teams, project managers and SMEs in the Gulf region.
While the timing of these campaigns aligns with geopolitical events, Bitdefender has not attributed this activity to any specific state-sponsored threat actor.
At this stage, the observed activity may include:
The targeting reflects strategic realities.
Gulf countries are:
This makes them attractive targets for credential theft, financial fraud and initial access into corporate environments.
These campaigns work because they blend into everyday workflows—so protection starts with slowing down and verifying what looks routine.
tags
Alina is a history buff passionate about cybersecurity and anything sci-fi, advocating Bitdefender technologies and solutions. She spends most of her time between her two feline friends and traveling.
View all posts