New 'Contagious Interview' and 'CrescentHarvest' Campaigns Target Crypto Wallets and Iranian Dissidents

Stealthy 'Contagious Interview' and 'CrescentHarvest' Campaigns Emerge with Targeted Attacks

HIGH
February 18, 2026
5m read
Threat ActorMalwarePhishing

Related Entities

Threat Actors

Iranian threat actor

Products & Tech

Full Report

Executive Summary

On February 18, 2026, researchers detailed two new, highly targeted cyber campaigns demonstrating advanced stealth and precision. The 'Contagious Interview' campaign is a sophisticated financial theft operation that compromises MetaMask crypto wallets by injecting malicious code into the browser. This code manipulates transaction data just before user approval, redirecting funds to attacker wallets. The second campaign, 'CrescentHarvest,' is a cyber-espionage operation attributed to an Iranian state-sponsored actor. It specifically targets political protestors and dissidents with surveillance malware delivered via phishing, aiming to monitor and suppress opposition activities. While their goals differ—one financial, one political—both campaigns showcase a move towards surgical, hard-to-detect attack methodologies.


Threat Overview

'Contagious Interview' Campaign

This is a financially motivated campaign focused on stealing cryptocurrency from users of the MetaMask browser wallet. The attack is not a brute-force or broad-spectrum attack, but a surgical manipulation.

  • Attack Vector: The initial vector is likely social engineering (as hinted by the name 'Contagious Interview'), tricking the user into installing a malicious browser extension or running malicious code.
  • Mechanism: Once active, the malicious code hooks into the browser's processes. When the user initiates a legitimate transaction in their MetaMask wallet, the code intercepts the transaction data after the user has reviewed it but before it is signed. It swaps the destination wallet address with one controlled by the attacker.
  • Impact: The user, believing they are sending funds to a legitimate address, approves the transaction, which is then irrevocably sent to the attacker. This is a form of Adversary-in-the-Middle (AitM) attack at the client level.

'CrescentHarvest' Campaign

This is a politically motivated cyber-espionage campaign attributed to an Iranian threat actor.

  • Targets: The campaign specifically targets Iranian political dissidents, protestors, and activists.
  • Attack Vector: The primary delivery method is phishing, likely via email or social media, with lures tailored to the interests of the target demographic.
  • Payload: The phishing links or attachments deliver a sophisticated surveillance malware. This malware is designed to harvest sensitive data from the compromised device, including emails, chat logs from secure messaging apps, location data, and microphone recordings.
  • Impact: The goal is to identify, monitor, and suppress opposition movements by compromising the communications and operational security of activists.

Technical Analysis

MITRE ATT&CK TTPs

Contagious Interview:

CrescentHarvest:

Impact Assessment

  • Contagious Interview: Poses a direct financial threat to cryptocurrency users. It undermines trust in web-based wallet technologies and demonstrates that even careful users can be defrauded if their browser environment is compromised.
  • CrescentHarvest: Represents a serious threat to human rights and personal safety. The surveillance of dissidents can lead to arrests, persecution, and the chilling of free speech and political opposition.

Detection & Response

  • For 'Contagious Interview': Detection is extremely difficult for the end-user. It requires security software that can detect malicious browser extensions or memory injection. Some advanced EDR solutions may detect this. The best defense is prevention.
  • For 'CrescentHarvest': Standard anti-phishing and anti-malware defenses apply. EDR solutions can detect the installation and execution of the surveillance malware. Network monitoring may spot C2 traffic from the compromised device.

Mitigation

  • For 'Contagious Interview':
    1. Use Hardware Wallets: For significant crypto holdings, always use a hardware wallet. This ensures that the transaction is signed on a separate, secure device, preventing the browser from being able to manipulate the final transaction data.
    2. Browser Security: Be extremely cautious about installing browser extensions. Only install well-known extensions from official stores and review their permissions carefully. D3FEND's D3-ACH - Application Configuration Hardening applies here.
  • For 'CrescentHarvest':
    1. User Training: High-risk individuals like activists must be trained to identify sophisticated phishing attempts.
    2. Endpoint Security: Use a reputable EDR or antivirus solution on all devices.
    3. Compartmentalization: Use separate devices or virtual machines for sensitive activities to limit the impact of a compromise.

Timeline of Events

1
February 18, 2026
Reports emerge detailing the 'Contagious Interview' and 'CrescentHarvest' campaigns.
2
February 18, 2026
This article was published

MITRE ATT&CK Mitigations

Critical for both scenarios to help users avoid the initial social engineering or phishing lure.

Endpoint security to detect and block the surveillance malware used in CrescentHarvest.

Mapped D3FEND Techniques:

For crypto users, this includes being extremely restrictive about which browser extensions are installed.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To defend against the 'Contagious Interview' campaign, users must practice strict browser hardening. This involves minimizing the number of installed browser extensions to an absolute minimum. Each extension increases the attack surface of the browser. Users should only install extensions from reputable developers and carefully review the permissions they request. Disabling automatic execution of scripts where possible and using privacy-focused browsers can also help. For MetaMask users, this hardening is a critical step to prevent the injection of malicious code that can manipulate their transactions.

To detect the 'CrescentHarvest' surveillance malware, endpoint security solutions must perform deep Process Analysis. This involves monitoring for suspicious process behaviors, such as an office application spawning a command shell, a new process attempting to hook into a messaging app, or a process attempting to access the microphone or webcam without user consent. EDR solutions can baseline normal activity and alert on these anomalous behaviors, which are hallmarks of espionage-focused malware. This is far more effective than relying on file signatures, as the malware used by APTs is often custom or polymorphic.

The ultimate mitigation for the 'Contagious Interview' threat is to move transaction signing off the computer entirely using a hardware wallet. Hardware wallets are a form of Hardware-based Process Isolation. They are purpose-built devices that store private keys and sign transactions in a secure, isolated hardware environment. The computer sends the unsigned transaction to the hardware wallet, the user verifies the details on the wallet's trusted screen, and then physically approves it. The signed transaction is sent back to the computer. This process makes it impossible for malware on the computer to alter the transaction details (like the destination address) before signing, completely neutralizing this attack vector.

Sources & References

Daily Cybersecurity Roundup, February 18, 2026
Cyware Social (cyware.com) February 18, 2026
New Campaigns Target MetaMask Users and Iranian Dissidents
The Hacker News (thehackernews.com) February 18, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CryptocurrencyMetaMaskCyberespionageIranMalwarePhishing

📢 Share This Article

Help others stay informed about cybersecurity threats