2026-05-06 | Auto-Generated 2026-05-06 | Oracle-42 Intelligence Research
```html

APT 35's AI-Generated LinkedIn Profiles: A 2025 Infiltration Campaign Against Middle Eastern Military Contractors

Executive Summary: In late 2025, Oracle-42 Intelligence identified a sustained campaign by Advanced Persistent Threat (APT) 35—an Iranian state-sponsored actor—leveraging AI-generated LinkedIn profiles to establish trust with high-value personnel at Middle Eastern military and defense contractors. The operation, codenamed Operation Olive Branch, demonstrates a sophisticated fusion of social engineering, generative AI, and operational security (OPSEC) designed to bypass traditional vetting processes. By mid-2026, multiple infiltration attempts had been detected, including successful engagements with employees at Tier-1 defense firms in the UAE and Saudi Arabia. This report provides a comprehensive analysis of the campaign, its technical underpinnings, and defensive countermeasures.

Key Findings

Campaign Timeline and Modus Operandi

A forensic analysis of compromised networks and dark web monitoring revealed that Operation Olive Branch began in Q3 2025, with the first AI-generated profiles appearing in late August. By December, APT 35 had established persistent communication channels with at least 12 high-value targets across three major contractors. The timeline can be segmented as follows:

Upon compromise, APT 35 conducted lateral movement using stolen credentials, targeting design documents, CAD files, and supplier lists. In one confirmed incident, proprietary schematics for a next-generation UAS were exfiltrated via DNS tunneling over a 72-hour period.

Technical Architecture of the AI-Generated Identities

The AI-generated personas were created using a hybrid approach combining:

Notably, the actors used a modular framework that allowed rapid re-profiling—if a persona was flagged or reported, a new one could be instantiated within 48 hours with minimal loss of operational continuity.

Defensive Gaps and Detection Challenges

Despite clear indicators, the campaign succeeded due to several systemic weaknesses:

Oracle-42 Intelligence identified a 67% reduction in detection time when identity governance platforms were integrated with behavioral threat intelligence feeds that included synthetic identity risk scoring.

Recommendations for Defense and Mitigation

To counter APT 35-style infiltration, organizations must adopt a Zero Trust Identity Framework with the following measures:

1. Identity Verification and Enrichment

2. Behavioral and Temporal Monitoring

3. Continuous Threat Intelligence Integration

4. Employee Awareness and Reporting

Future Threat Projection

APT 35's campaign signals a broader trend: state actors are increasingly leveraging AI to exploit human trust at scale. By 2027, we anticipate:

Organizations must transition from reactive to predictive identity security, integrating AI-native defense mechanisms that treat synthetic identities as a first-class threat.

FAQ© 2026 Oracle-42 | 94,000+ intelligence data points | Privacy | Terms