On February 18, 2026, researchers detailed two new, highly targeted cyber campaigns demonstrating advanced stealth and precision. The 'Contagious Interview' campaign is a sophisticated financial theft operation that compromises MetaMask crypto wallets by injecting malicious code into the browser. This code manipulates transaction data just before user approval, redirecting funds to attacker wallets. The second campaign, 'CrescentHarvest,' is a cyber-espionage operation attributed to an Iranian state-sponsored actor. It specifically targets political protestors and dissidents with surveillance malware delivered via phishing, aiming to monitor and suppress opposition activities. While their goals differ—one financial, one political—both campaigns showcase a move towards surgical, hard-to-detect attack methodologies.
This is a financially motivated campaign focused on stealing cryptocurrency from users of the MetaMask browser wallet. The attack is not a brute-force or broad-spectrum attack, but a surgical manipulation.
This is a politically motivated cyber-espionage campaign attributed to an Iranian threat actor.
Contagious Interview:
T1176 - Browser Extensions: A likely vector for injecting the malicious code into the browser environment.T1114 - Email Collection: The malicious code intercepts and manipulates data within the browser session, a form of client-side data manipulation.T1649 - Steal or Forge Authentication Tokens: While not stealing tokens, it manipulates the data that a token would be used to sign, achieving a similar outcome.CrescentHarvest:
T1566 - Phishing: The primary initial access vector.T1219 - Remote Access Software: The surveillance malware acts as a Remote Access Trojan (RAT).T1056.001 - Keylogging: A common feature of such surveillance malware.T1125 - Video Capture: May include screen recording or capturing webcam data.D3-ACH - Application Configuration Hardening applies here.Critical for both scenarios to help users avoid the initial social engineering or phishing lure.
Endpoint security to detect and block the surveillance malware used in CrescentHarvest.
Mapped D3FEND Techniques:
For crypto users, this includes being extremely restrictive about which browser extensions are installed.
Mapped D3FEND Techniques:
To defend against the 'Contagious Interview' campaign, users must practice strict browser hardening. This involves minimizing the number of installed browser extensions to an absolute minimum. Each extension increases the attack surface of the browser. Users should only install extensions from reputable developers and carefully review the permissions they request. Disabling automatic execution of scripts where possible and using privacy-focused browsers can also help. For MetaMask users, this hardening is a critical step to prevent the injection of malicious code that can manipulate their transactions.
To detect the 'CrescentHarvest' surveillance malware, endpoint security solutions must perform deep Process Analysis. This involves monitoring for suspicious process behaviors, such as an office application spawning a command shell, a new process attempting to hook into a messaging app, or a process attempting to access the microphone or webcam without user consent. EDR solutions can baseline normal activity and alert on these anomalous behaviors, which are hallmarks of espionage-focused malware. This is far more effective than relying on file signatures, as the malware used by APTs is often custom or polymorphic.
The ultimate mitigation for the 'Contagious Interview' threat is to move transaction signing off the computer entirely using a hardware wallet. Hardware wallets are a form of Hardware-based Process Isolation. They are purpose-built devices that store private keys and sign transactions in a secure, isolated hardware environment. The computer sends the unsigned transaction to the hardware wallet, the user verifies the details on the wallet's trusted screen, and then physically approves it. The signed transaction is sent back to the computer. This process makes it impossible for malware on the computer to alter the transaction details (like the destination address) before signing, completely neutralizing this attack vector.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats