"Throughout the autumn of 2018 we analyzed a long-standing (and still active at that time) cyber-espionage campaign that was primarily targeting foreign diplomatic entities based in Iran. The attackers were using an improved version of Remexi in what the victimology suggests might be a domestic cyber-espionage operation," the press release read.
READ MORE: Kaspersky Spotted Leak NSA Missed as Spy Agency Lacks ‘Good Handle' on Security
"Activity of the Chafer APT group has been observed since at least 2015… Traditionally, Chafer has been focusing on targets inside Iran, although their interests clearly include other countries in the Middle East," the press release read further.
Kaspersky Lab indicated that the malware used by the black hats in the attacks was written by the hacker group's developers, while at the same time adding that the intruders also utilized legitimate Microsoft utilities.