Threat actors are sharpening stealth and precision across financial and espionage operations. The Contagious Interview campaign is covertly compromising MetaMask browser wallets by injecting malicious code that alters transaction data and redirects cryptocurrency funds unnoticed. At the same time, the CrescentHarvest campaign, linked to an Iranian threat actor, is targeting protestors and dissidents with phishing and surveillance malware to capture sensitive communications. According to Unit 42’s 2025 findings, identity weaknesses were involved in nearly 90% of investigations, with phishing and vulnerability exploitation remaining the top initial access vectors at 22% each. Keep reading further.