Recent from talks
Nothing was collected or created yet.
Charming Kitten
View on Wikipedia
Charming Kitten, also called APT35 (by Mandiant), Phosphorus or Mint Sandstorm (by Microsoft),[1] Ajax Security (by FireEye),[2] and NewsBeef (by Kaspersky[3][4]), is an Iranian government cyberwarfare group, described by several companies and government officials as an advanced persistent threat (APT).
Key Information
The United States Cybersecurity and Infrastructure Security Agency (CISA) has identified Charming Kitten as one of several Iranian state-aligned actors that target civil society organizations, including journalists, academics, and human rights defenders, in the United States, Europe, and the Middle East, as part of efforts to collect intelligence, manipulate discourse, and suppress dissent.[5]
The group is known to conduct phishing campaigns that impersonate legitimate organizations and websites, using fake accounts and domains to harvest user credentials.[6]
History
[edit]Witt defection (2013)
[edit]In 2013, former United States Air Force technical sergeant and military intelligence defense contractor Monica Witt defected to Iran[7] knowing she might incur criminal charges by the United States for doing so.[citation needed] Her giving of intelligence to the government of Iran later caused Operation Saffron Rose, a cyberwarfare operation that targeted US military contractors.[citation needed]
HBO cyberattack (2017)
[edit]In 2017, following a cyberattack on HBO, a large-scale joint investigation was launched on the grounds that confidential information was being leaked. A conditional statement by a hacker going by alias Sokoote Vahshat (Persian سکوت وحشت lit. 'Silence of Fear') said that if money was not paid, scripts of television episodes, including episodes of Game of Thrones, would be leaked. The hack caused a leak of 1.5 terabytes of data, some of which was shows and episodes that had not been broadcast at the time.[8] HBO has since stated that it would take steps to make sure that they would not be breached again.[9]
Behzad Mesri was subsequently indicted for the hack. He has since been alleged to be part of the operation unit that had leaked confidential information.[10]
According to Certfa, Charming Kitten had targeted US officials involved with the 2015 Iran Nuclear Deal. The Iranian government denied any involvement.[11][12]
Second indictment (2019)
[edit]A federal grand jury in the United States District Court for the District of Columbia indicted Witt on espionage charges (specifically "conspiracy to deliver and delivering national defense information to representatives of the Iranian government"). The indictment was unsealed on February 19, 2019. In the same indictment, four Iranian nationals—Mojtaba Masoumpour, Behzad Mesri, Hossein Parvar and Mohamad Paryar—were charged with conspiracy, attempting to commit computer intrusion, and aggravated identity theft, for a campaign in 2014 and 2015 that sought to compromise the data of Witt's former co-workers.[13]
In March 2019, Microsoft took ownership of 99 DNS domains owned by the Iranian government-sponsored hackers, in a move intended to decrease the risk of spear-phishing and other cyberattacks.[14]
Media impersonation campaign (2019-2020)
[edit]In 2020, Reuters reported that Charming Kitten targeted critics of the Iranian government, academics, and journalists, such as Erfan Kasraie and Hassan Sarbakhshian, who received fake interview requests designed to harvest email credentials. The emails impersonated reporters from outlets like The Wall Street Journal, CNN, and Deutsche Welle, sometimes asking recipients to enter Google passwords or sign bogus contracts. Cybersecurity firms Certfa, ClearSky, and Secureworks attributed the operation to Charming Kitten based on tactics, infrastructure, and targeting.[15]
2020 election interference attempts (2019)
[edit]According to Microsoft, in a 30-day period between August and September 2019, Charming Kitten made 2,700 attempts to gain information regarding targeted email accounts.[16] This resulted in 241 attacks and 4 compromised accounts. Although the initiative was deemed to have been aimed at a United States presidential campaign, none of the compromised accounts were related to the election.
Microsoft did not reveal who specifically was targeted, but a subsequent report by Reuters claimed it was Donald Trump's re-election campaign.[17] This assertion is corroborated by the fact that only the Trump campaign used Microsoft Outlook as an email client.
Iran denied any involvement in election meddling, with the Iranian Foreign Minister Mohammad Javad Zarif stating "We don’t have a preference in your election [the United States] to intervene in that election," and "We don’t interfere in the internal affairs of another country," in an interview on NBC's "Meet The Press".[18]
Cybersecurity experts at Microsoft and third-party firms such as ClearSky Cyber Security maintain that Iran, specifically Charming Kitten, was behind the attempted interference, however. In October 2019, ClearSky released a report supporting Microsoft's initial conclusion.[19] In the report, details about the cyberattack were compared to those of previous attacks known to originate from Charming Kitten. The following similarities were found:
- Similar victim profiles. Those targeted fell into similar categories. They were all people of interest to Iran in the fields of academia, journalism, human rights activism, and political opposition.
- Time overlap. Verified Charming Kitten activity was ramping up within the same timeframe that the election interference attempts were made.
- Consistent attack vectors. The methods of attack were similar, with the malicious agents relying on spear-phishing via SMS texts.
Operational exposure (2020)
[edit]In 2020, IBM’s X-Force IRIS team uncovered over 40GB of data from Charming Kitten, including training videos showing operatives hacking email and social media accounts. The footage included access to accounts of US and Hellenic Navy personnel, failed phishing attempts on US officials, and use of tools like Zimbra to manage stolen credentials. Researchers described the discovery as a rare insight into the group’s methods and suggested it showed limited ability to bypass multi-factor authentication.[20]
HYPERSCRAPE data theft tool (2022)
[edit]On August 23, 2022, a Google Threat Analysis Group (TAG) blog post revealed a new tool developed by Charming Kitten to steal data from well-known email providers (i.e. Google, Yahoo!, and Microsoft).[21] This tool needs the target's credentials to create a session on its behalf. It acts in such a way that using old-style mail services looks normal to the server and downloads the victim's emails, and does some changes to hide its fingerprint.
Per the report, the tool is developed on the windows platform but not for the victim's machine. It uses both command line and GUI to enter credentials or other required resources like cookies.
Activist targeting in Europe (2023)
[edit]In September 2023, Germany’s domestic intelligence agency issued a public warning about “concrete spying attempts” by the Iranian-linked hacker group Charming Kitten, according to The Guardian. The report followed incidents documented across several European countries in which Iranian activists experienced hacking attempts, cyberattacks, online harassment, and threats of physical harm. Activists in Germany, France, the UK, and Spain were reportedly warned by local authorities about threats allegedly linked to Iranian cyber actors.[22]
See also
[edit]References
[edit]- ^ "Microsoft uses court order to shut down APT35 websites". CyberScoop. March 27, 2019. Archived from the original on February 6, 2023. Retrieved September 10, 2019.
- ^ "Ajax Security Team lead Iran-based hacking groups". Security Affairs. May 13, 2014. Archived from the original on December 2, 2022. Retrieved September 10, 2019.
- ^ "Freezer Paper around Free Meat". securelist.com. April 27, 2016. Archived from the original on January 28, 2023. Retrieved September 10, 2019.
- ^ Bass, Dina. "Microsoft Takes on Another Hacking Group, This One With Links to Iran". news.bloomberglaw.com. Archived from the original on December 2, 2022. Retrieved September 10, 2019.
- ^ "Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society" (PDF). U.S. Cybersecurity and Infrastructure Security Agency (CISA). May 14, 2024. Retrieved April 25, 2025.
- ^ "Iranian Charming Kitten ATP group poses as Israeli cybersecurity firm in phishing campaign". Security Affairs. July 3, 2018. Archived from the original on December 4, 2022. Retrieved September 10, 2019.
- ^ Blinder, Alan; Turkewitz, Julie; Goldman, Adam (February 16, 2019). "Isolated and Adrift, an American Woman Turned Toward Iran". The New York Times. ISSN 0362-4331. Archived from the original on February 17, 2019. Retrieved April 23, 2022.
- ^ "The HBO hack: what we know (and what we don't) - Vox". August 5, 2017. Archived from the original on April 23, 2019. Retrieved September 10, 2019.
- ^ Petski, Denise (July 31, 2017). "HBO Confirms It Was Hit By Cyber Attack".
- ^ "HBO Hacker Was Part of Iran's "Charming Kitten" Elite Cyber-Espionage Unit". BleepingComputer.
- ^ "Iranian Hackers Target Nuclear Experts, US Officials". Dark Reading. December 15, 2018.
- ^ Satter, Raphael (December 13, 2018). "AP Exclusive: Iran hackers hunt nuclear workers, US targets". AP NEWS.
- ^ "Former U.S. Counterintelligence Agent Charged With Espionage on Behalf of Iran; Four Iranians Charged With a Cyber Campaign Targeting Her Former Colleagues" (Press release). United States Department of Justice, Office of Public Affairs. February 13, 2019.
- ^ "Microsoft seizes 99 domains owned by Iranian state hackers". News @ WebHosting.info. March 28, 2019. Archived from the original on January 19, 2021. Retrieved September 10, 2019.
- ^ "Exclusive: Iran-linked hackers pose as journalists in email scam". Reuters. February 5, 2020. Retrieved April 25, 2025.
- ^ "Recent cyberattacks require us all to be vigilant". Microsoft On the Issues. October 4, 2019. Archived from the original on October 4, 2019. Retrieved December 10, 2020.
- ^ Bing, Christopher; Satter, Raphael (October 4, 2019). "Exclusive: Trump campaign targeted by Iran-linked hackers - sources". Reuters.
- ^ AP. "Iran denies US election meddling, claims it has no preference". The Times of Israel. ISSN 0040-7909. Retrieved December 10, 2020.
- ^ "The Kittens Are Back in Town 2" (PDF). ClearSky Cyber Security. October 2019. Archived (PDF) from the original on September 9, 2024. Retrieved September 9, 2024.
- ^ "Iranian state hackers caught with their pants down in intercepted videos". Ars Technica. July 17, 2020. Retrieved April 25, 2025.
- ^ Bash, Ajax (August 23, 2022). "New Iranian APT data extraction tool". Threat Analysis Group (TAG). Archived from the original on September 9, 2024. Retrieved September 9, 2024.
- ^ "Iranian activists across Europe are targets of threats and harassment". The Guardian. September 22, 2023. Retrieved April 25, 2025.
Charming Kitten
View on GrokipediaBackground and Attribution
Iranian State Links and Sponsorship
Charming Kitten, also tracked as APT35 and Phosphorus, has been attributed to Iranian state sponsorship by leading cybersecurity firms, with operations aligning closely to the geopolitical interests of the Iranian regime, such as espionage against nuclear negotiators and regime critics.[4] CrowdStrike assesses the group as having a suspected nexus to the Islamic Revolutionary Guard Corps (IRGC), Iran's primary military and intelligence apparatus responsible for external operations, based on consistent targeting patterns, use of Farsi-language tools, and infrastructure overlaps with other IRGC-linked actors since at least late 2013.[4] Microsoft similarly links Phosphorus to Iranian hackers, noting spear-phishing campaigns against U.S. political figures and infrastructure that mirror state-directed intelligence gathering.[5] Attributions stem from forensic analysis of malware samples, command-and-control servers hosted in Iran or using Iranian proxies, and operational focus on high-value targets like Israeli defense personnel and U.S. officials involved in sanctions enforcement.[6] In June 2025, reports detailed APT35's use of AI-generated lures in spear-phishing against Israeli tech experts, tactics consistent with IRGC-backed cyber units aimed at stealing proprietary data for strategic advantage.[6] U.S. indictments provide further corroboration; for instance, in 2019, former U.S. Air Force officer Monica Witt was charged with defecting to Iran and aiding an IRGC-linked espionage ring involving Charming Kitten's tactics against her former colleagues.[7] Similarly, Iranian national Behzad Mesri's 2017 indictment for the HBO breach revealed ties to Charming Kitten's custom tools and social engineering methods.[8] While Iran denies official involvement, dismissing attributions as Western fabrications, the consistency across independent analyses from firms like FireEye (now Mandiant) and ClearSky—drawing on shared indicators of compromise and post-exploitation behaviors—supports state orchestration rather than independent criminal activity.[1] These links underscore Charming Kitten's role in Iran's asymmetric cyber strategy, enabling deniable intelligence collection without kinetic escalation, though the group's technical maturity lags behind peers like Russian APTs.[9] No direct financial sponsorship details are public, but operational scale and persistence indicate regime resourcing through IRGC cyber divisions.[4]Discovery, Aliases, and Initial Analysis
Charming Kitten, an advanced persistent threat (APT) group, was first publicly detailed under that designation in a December 2017 report by ClearSky Cyber Security, which analyzed phishing campaigns targeting Israeli defense entities and linked the operations to Iranian actors through shared infrastructure and tactics.[8] Prior to this naming, the group had been tracked by FireEye (now Mandiant) as APT35 since at least 2014, based on observed cyber-espionage activities including spear-phishing and credential theft against Middle Eastern targets.[10] CrowdStrike independently identified similar operations under the name Charming Kitten, attributing initial activity to late 2013 with a suspected connection to Iran's Islamic Revolutionary Guard Corps (IRGC).[4] The group operates under multiple aliases assigned by various cybersecurity firms, reflecting overlapping attributions based on technical indicators like malware samples and command-and-control domains. These include APT35 (Mandiant), Phosphorus and later Mint Sandstorm (Microsoft), Magic Hound (Symantec), Cobalt Illusion, Ajax Security (FireEye), and NewsBeef (Kaspersky).[11] Such naming conventions arise from independent clusterings of intrusions, with cross-correlations established over time through shared tools like custom backdoors and phishing kits.[12] Early analyses characterized Charming Kitten as a state-sponsored Iranian espionage actor emphasizing social engineering over zero-day exploits, with initial campaigns focusing on reconnaissance via fake personas on social media and email lures impersonating recruiters or journalists.[8] Attribution to Iran stemmed from linguistic artifacts in malware (Farsi comments), IP geolocation to Iranian infrastructure, and alignment with geopolitical targets such as nuclear negotiators and regime critics, though some researchers noted potential overlaps with other Iranian clusters like APT39, urging caution against over-attribution without multi-source validation.[1][4]Tactics, Techniques, and Procedures
Social Engineering and Phishing Operations
Charming Kitten, an Iranian state-sponsored advanced persistent threat group also known as APT35, primarily employs social engineering and spear-phishing as initial access vectors to target individuals with access to sensitive information on Iran-related topics. These operations involve crafting fake personas on platforms such as LinkedIn, Facebook, and WhatsApp to establish rapport over days or weeks, often impersonating journalists, academics, or professionals to exploit targets' professional interests.[13][14] Lures typically include invitations to virtual meetings, webinar participation, or document reviews tied to geopolitical issues like Iran-Israel relations or professional collaborations, progressing to malicious links or attachments hosted on compromised domains.[14][15] In a July 2020 campaign, the group impersonated journalists from Deutsche Welle and the Jewish Journal, sending personalized spear-phishing emails to Israeli scholars at universities including Haifa and Tel Aviv, offering speaker roles in fabricated webinars such as "Iran and Israel, Change or Stability?" with promised honorariums.[14] These emails directed victims to malicious links on subdomains of legitimate sites like akademie.dw[.]de, while supporting infrastructure included well-developed fake LinkedIn profiles and WhatsApp communications from German numbers (+49 prefix), involving Persian-speaking actors to conduct voice calls and sustain engagement for up to 10 days.[14] Attachments, such as password-protected ZIP files, were delivered via these channels to deploy credential-harvesting malware.[14][15] By June 2023, Charming Kitten refined these tactics in attacks targeting experts publishing on Iran, posing as an Israeli reporter to request document reviews, which contained an updated variant of the POWERSTAR backdoor designed for credential theft and system pivoting, such as via VPNs.[15] Broader patterns include emotive or opportunity-based lures, such as fake surveys in Excel files or collaborations from personas like a British photographer named Mia Ash, aimed at sectors including defense, energy, and academia to elicit clicks on spoofed or compromised email links.[13][16] These methods prioritize human manipulation over technical exploits, enabling access to personal accounts for espionage against dissidents, journalists, and policy influencers.[13][15]Malware and Custom Tools
Charming Kitten, an Iranian state-sponsored advanced persistent threat group also tracked as APT35, deploys custom malware primarily designed for espionage, credential theft, and persistent access rather than destruction. These tools are often modular, PowerShell-based, or dropper-style implants customized per victim, reflecting the group's focus on targeted operations against high-value individuals and organizations. Delivery typically occurs via spear-phishing lures disguised as legitimate documents or links, exploiting user interaction to fetch payloads from cloud storage or decentralized networks like IPFS.[17][18] The POWERSTAR backdoor (also known as CharmPower) exemplifies the group's toolkit, functioning as a versatile PowerShell implant for command execution, persistence establishment, and reconnaissance. It collects system information, downloads additional modules for tasks such as process enumeration, screenshot capture, file searching, and monitoring persistence mechanisms, while incorporating cleanup routines to delete traces and registry artifacts. An updated variant observed in May 2023 enhances operational security with separate encryption for components and IPFS-based command-and-control (C2) retrieval for resilience against takedowns. POWERSTAR is deployed through password-protected RAR archives containing LNK files that trigger payload downloads from services like Backblaze, attributed to Charming Kitten by cybersecurity firm Volexity based on code overlaps and infrastructure patterns.[17][19] BellaCiao represents another bespoke implant, acting as a dropper that disables endpoint protections like Microsoft Defender, creates persistent services, and deploys secondary payloads such as the IIS-Raid webshell for web server compromise. It facilitates credential exfiltration, file upload/download, and arbitrary command execution, with C2 communication masked via DNS resolution to evade detection; samples include hardcoded victim details like company names and IP addresses, indicating per-target customization. Attributed to Charming Kitten through tactical similarities and shared infrastructure with prior campaigns, BellaCiao has been linked to exploits like ProxyShell on Microsoft Exchange servers, targeting entities in the US, Europe, Middle East, and beyond since at least April 2023.[18][20][21] Additional tools include HYPERSCRAPE, a data extraction utility for harvesting email content and user data post-compromise, and the Sponsor backdoor, which supports espionage against at least 34 victims in regions like Brazil, Israel, and the UAE. These align with Charming Kitten's emphasis on stealthy, human-centric intrusions over widespread commodity malware, as evidenced by overlaps in code reuse and evasion techniques across reports from firms like ESET and SOC Prime.[22][23]Persistence and Exfiltration Strategies
Charming Kitten maintains persistence through a combination of registry modifications, scheduled tasks, and account manipulations on Windows systems. In deployments of the POWERLESS backdoor, the group establishes persistence by altering theHKCU\Software\[Microsoft](/page/Microsoft)\Windows [NT](/page/Windows_NT)\CurrentVersion\Winlogon\Shell registry key to execute malicious payloads on user logon, alongside hijacking the COM handler for MsCtfMonitor to ensure continued access.[24] Similarly, emulations of APT35 operations reveal the creation of scheduled tasks via the schtasks utility, using XML and batch files for periodic execution of reconnaissance and backdoor components.[25] The group also modifies local accounts, such as elevating the DefaultAccount to Administrators and Remote Desktop Users groups, providing alternate entry points for re-access.[25]
Advanced persistence involves malware-specific mechanisms and evasion tactics. The POWERSTAR backdoor, a core tool in Charming Kitten's arsenal, incorporates dynamic configuration updates and monitoring of existing persistence methods to adapt and reinforce footholds, often leveraging private infrastructure like IPFS nodes to avoid detection from public cloud takedowns.[26] BASICSTAR, delivered via LNK files in phishing RAR archives, achieves persistence through command loops executed via NirCmd, with supporting VBS and PowerShell scripts for sustained operations.[24] Broader techniques include DLL hijacking with obfuscated payloads to bypass endpoint detection, web shell deployments (e.g., custom PHP or Adminer), and compromise of domain admin accounts or backup systems like Acronis for embedded longevity.[2]
For exfiltration, Charming Kitten prioritizes stealthy, high-volume data transfer aligned with espionage goals. Credential dumps from LSASS processes, obtained via rundll32.exe invoking comsvcs.dll, are transmitted outbound using HTTP POST requests to external command-and-control servers.[25] The custom HYPERSCRAPE tool targets webmail services, scraping contents from Gmail, Yahoo, and Microsoft Outlook accounts to extract sensitive communications without direct network traversal from victim machines.[22] In escalated operations, the group dumps databases via tools like Adminer, accesses cloud backups for bulk retrieval, and exfiltrates email archives, VoIP recordings, and domain controller data, with documented instances involving over 74 GB of stolen material from targeted entities.[2] These methods often rely on living-off-the-land binaries for lateral movement and staging, minimizing custom artifacts while maximizing yield through compromised VPNs and file upload portals.[27]
