Charming Kitten
Country: Islamic Republic of Iran Organization: Islamic Revolutionary Guard Corps Intelligence Organization (IRGC-IO) Objective: Espionage, Intelligence collection (Page last updated September 04, 2024)
Aliases:
- APT42 (Mandiant)
- APT35 (Check Point Research, Google Threat Analysis Group)
- Ballistic Bobcat (ESET)
- CALANQUE (Google Threat Analysis Group)
- CharmingCypress (Volexity)
- Charming Kitten (Clearsky, CERT-FA, Bitdefender)
- COBALT ILLUSION (Secureworks)
- ITG18 (IBM)
- Magic Hound (MITRE, Unit 42, Cyble)
- Mint Sandstorm (Microsoft)
- PHOSPHORUS (previously used by Microsoft, The DFIR Report, Deep Instinct, Cybereason)
- TAG-56 (previously used by Recorded Future)
- TA453 (Proofpoint)
- TunnelVision or Tunnel Vision (eSentire, SentinelOne)
- Yellow Garuda (PwC)
Sub-group:
- Nemesis Kitten (CrowdStrike)
- Storm-0270 (Microsoft, formerly tracked as DEV-0270)
Vulnerabilities Exploited
- CVE-2022-47966 (9.8 critical) Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability Source: Microsoft
- CVE-2023-27350 (9.8 critical) PaperCut MF/NG Improper Access Control Vulnerability Source: Microsoft Threat Intelligence
- CVE-2022-47986 (9.8 critical) IBM Aspera Faspex Code Execution Vulnerability. Source: Microsoft
- Log4Shell:
- CVE-2021-44228 (10.0 critical) Apache Log4j2 Remote Code Execution Vulnerability (aka Log4Shell). Source: Check Point Research, Microsoft
- CVE-2021-45046 (9.0 critical) Apache Log4j2 Deserialization of Untrusted Data Vulnerability Source: Microsoft
- CVE-2018-13379 (9.8 critical) Fortinet FortiOS SSL VPN Path Traversal Vulnerability. Source: Microsoft, SentinelOne
- ProxyLogon (Source: Microsoft):
- CVE-2021-26855 (9.8 critical) Microsoft Exchange Server Remote Code Execution Vulnerability
- CVE-2021-26857 (7.8 high) Microsoft Exchange Server Remote Code Execution Vulnerability
- CVE-2021-26858 (7.8 high) Microsoft Exchange Server Remote Code Execution Vulnerability
- CVE-2021-27065 (7.8 high) Microsoft Exchange Server Remote Code Execution Vulnerability
- ProxyShell (Source: The DFIR Report):
- CVE-2021-34473 (9.1 critical) Microsoft Exchange Server Remote Code Execution Vulnerability
- CVE-2021-34523 (9.8 critical)
Microsoft Exchange Server Privilege Escalation Vulnerability
- CVE-2021-31207 (6.6 medium) Microsoft Exchange Server Security Feature Bypass Vulnerability
Tactics, Techniques, and Procedures
Mapped to MITRE ATT&CK
Known Tools Used
External link: MITRE
References
Disclaimer: Not an exhaustive list of resources. Most contain actionable intelligence, not just news reporting.
Links (Sorted in Chronological Order)
2024
- August 28, 2024 โ Mandiant: I Spy With My Little Eye: Uncovering an Iranian Counterintelligence Operation (note: weak overlap)
- August 23, 2024 โ Meta: Taking Action Against Malicious Accounts in Iran
- August 20, 2024 โ Proofpoint: Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset
- August 20, 2024 โ Recorded Future: GreenCharlie Infrastructure Linked to US Political Campaign Targeting, available as PDF
- August 19, 2024 โ CISA: Joint ODNI, FBI, and CISA Statement on Iranian Election Influence Efforts (Note: not explicitly identified)
- August 14, 2024 โ Google Threat Analysis Group (TAG): Iranian backed group steps up phishing campaigns against Israel, U.S.
- August 14, 2024 โ Harfang Lab: Cyclops: a likely replacement for BellaCiao
- August 08, 2024 โ Microsoft Threat Analysis Center Iran Targeting 2024 US Election
- May 22, 2024 โ Cyble: Threat Actor Profile: Magic Hound
- May 10, 2024: New Jersey Cybersecurity & Communications Integration Cell (NJ-CCIC): Recent Observed Iranian State-Sponsored Cyber Threat Group Activity (ATTRIBUTION to IRGC-IO)
- May 1, 2024 โ Mandiant: Uncharmed: Untangling Iran's APT42 Operations
- February 13, 2024 โ Volexity: CharmingCypress: Innovating Persistence
- January 17, 2024 โ Microsoft: New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs
2023
- November 09, 2023 โ Microsoft: Microsoft shares threat intelligence at CYBERWARCON 2023
- September 11, 2023 โ ESET: Sponsor with batch-filed whiskers: Ballistic Bobcatโs scan and strike backdoor
- June 28, 2023 โ Volexity: Charming Kitten Updates POWERSTAR with an InterPlanetary Twist
- July 06, 2023 โ Proofpoint: Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware
- April 26, 2023 โ Bitdefender: Unpacking BellaCiao: A Closer Look at Iranโs Latest Malware
- April 18, 2023 โ Microsoft: Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets
- March 09, 2023 โ Secureworks: COBALT ILLUSION Masquerades as Atlantic Council Employee
2022
- December 14, 2022 โ Proofpoint: Wouldโve, Couldโve, ShouldโveโฆDid: TA453 Refuses to be Bound by Expectations
- December 12, 2022 โ SOCRadar: Dark Web Profile: APT42 โ Iranian Cyber Espionage Group
- November 29, 2022 โ Recorded Future: Suspected Iran-Nexus TAG-56 Uses UAE Forum Lure for Credential Theft Against US Think Tank, available as PDF
- September 27, 2022 โ Avertium: An In-Depth Look at APT35 aka Charming Kitten
- September 14, 2022 โ U.S. Treasury: Treasury Sanctions IRGC-Affiliated Cyber Actors for Roles in Ransomware Activity (ATTRIBUTION to IRGC, links โTunnel Visionโ to Charming Kitten)
- September 13, 2022 โ Proofpoint: Look What You Made Me Do: TA453 Uses Multi-Persona Impersonation to Capitalize on FOMO
- September 09, 2022 โ CERT-FA: Charming Kitten: โCan We Have A Meeting?โ
- September 07, 2022 โ Mandiant: APT42: Crooked Charms, Cons, and Compromises, available as PDF
- September 07, 2022 โ Microsoft: Profiling DEV-0270: PHOSPHORUSโ ransomware operations
- August 23, 2022 โ Google Threat Analysis Group (TAG): New Iranian APT data extraction tool
- July 22, 2022 โ PwC: Old cat, new tricks, bad habits
- June 01, 2022 โ Deep Instinct: Iranian Threat Actor Continues to Develop Mass Exploitation Tools
- March 30, 2022 โ Recorded Future: Social Engineering Remains Key Tradecraft for Iranian APTs, available as PDF
- March 21, 2022 โ The DFIR Report: PHOSPHORUS Automates Initial Access Using ProxyShell
- March 09, 2022 โ eSentire: Exploitation of VMware Horizon Servers by TunnelVision Threat Actor
- February 17, 2022 โ SentinelOne: Log4j2 In The Wild | Iranian-Aligned Threat Actor โTunnelVisionโ Actively Exploiting VMware Horizon
- February 01?, 2022 โ Cybereason: PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage
- January 11, 2022 โ Check Point Research: APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit
2021
- November 16, 2021 โ Microsoft: Evolving trends in Iranian threat actor activity โ MSTIC presentation at CyberWarCon 2021
- November 15, 2021 โ The DFIR Report: Exchange Exploit Leads to Domain Wide Ransomware
- October 14, 2021 โ Google Threat Analysis Group (TAG): Countering threats from Iran
- August 04, 2021 โ IBM: ITG18: Operational security errors continue to plague sizable Iranian threat group
- July 13, 2021 โ Proofpoint: Operation SpoofedScholars: A Conversation with TA453
- March 30, 2021 โ Proofpoint: BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns
- January 08, 2021 โ CERT-FA: Charming Kittenโs Christmas Gift
2020
- October 28, 2020 โ Microsoft: Cyberattacks target international conference attendees
- August 27, 2020 โ Clearsky: The Kittens Are Back in Town 3, available as PDF
- July 16, 2020 โ IBM: New Research Exposes Iranian Threat Group Operations
- January 30, 2020 โ CERT-FA: Fake Interview: The New Activity of Charming Kitten
2019
- October 07, 2019 โ Clearsky: The Kittens Are Back in Town 2 โ Charming Kitten Campaign Keeps Going on, Using New Impersonation Methods
- October 04, 2019 โ Microsoft: Recent cyberattacks require us all to be vigilant
- September 15, 2019 โ Clearsky: The Kittens Are Back in Town Charming Kitten โ Campaign Against Academic Researchers
- March 17, 2019 โ Microsoft: New steps to protect customers from hacking
2018
- December 13, 2018 โ CERT-FA: The Return of The Charming Kitten
2017
- December 05, 2017 โ Clearsky: Charming Kitten: Iranian Cyber Espionage Against Human Rights Activists, Academic Researchers and Media Outlets available as a PDF (PDF)
- February 06, 2017 โ Iran Threats: iKittens: Iranian Actor Resurfaces with Malware for Mac (MacDownloader)
2016
- November 11, 2016 โ Iran Threats: Fictitious Profiles and WebRTCโs Privacy Leaks Used to Identify Iranian Activists
- April 27, 2016 โ Kaspersky: Freezer Paper around Free Meat