A new threat cluster, tracked as RedKitten, has launched an AI-accelerated malware campaign targeting individuals and organizations monitoring human rights violations related to the Dey 1404 protests in Iran, researchers say. The RedKitten campaign leverages a sophisticated C2 implant called SloppyMIO, delivered via macro-enabled Excel spreadsheets.Â
These documents are designed as "shock lures," falsely claiming to contain lists of casualties from the recent civil unrest.Â
Upon execution, the malware uses a technique known as AppDomainManager injection, according to security researchers. It then retrieves its configuration steganographically from images hosted online, whose URLs are provided by a Dead Drop Resolver (DDR) hosted on GitHub via suspected stolen accounts.Â
This configuration includes a Telegram bot token and chat ID for command-and-control (C2) communications. The malware is capable of:
The researchers believe that Large Language Model (LLM) assistance was leveraged in this campaign.
While attribution is challenging due to overlapping TTPs among Iranian-nexus groups, evidence links this campaign to a Farsi-speaking actor, as well as IRGC-aligned threat actor Yellow Liderc (also known as IMPERIAL KITTEN, TA456) and COBALT MIRAGE.
To mitigate threats from Iranian protest-themed cyberattacks, organizations must enhance their security posture. Key cybersecurity recommendations include:
Using shocking lures is a tactic that aligns with alleged prior operations conducted by threat actors supporting Iranian state interests. A January report outlined a new malware strain tracked as Devixor that combines a banking RAT and ransomware to target Iranian banks, crypto platforms, and payment services.
Similarly, Afghan government workers were targeted with phishing lures such as decoy documents disguised as official correspondence to deliver FalseCub Malware.