Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
Charming Kitten, also known as APT35, Phosphorus, Ajax Security Team, and ITG18, is a sophisticated Iranian cyber-espionage group active since at least 2011. Closely affiliated with the Islamic Revolutionary Guard Corps (IRGC), their activities focus on cyber espionage, surveillance, and geopolitical influence. Utilizing spear-phishing, impersonation, and custom malware to infiltrate high-profile individuals and industries, they remain a persistent and dangerous threat actor.
The group’s primary goals involve intelligence collection on geopolitical adversaries, conducting influence campaigns, and surveillance of dissidents and activists. They often aim to compromise sensitive information for espionage purposes.
Charming Kitten employs advanced spear-phishing campaigns, impersonating journalists, academics, or credible organizations to gain the trust of their targets. They mimic legitimate websites, deploy phishing-as-a-service, and use sophisticated social engineering tactics. Additionally, multi-factor authentication (MFA) bypass techniques, such as push fatigue attacks, demonstrate their adaptability.
Notable procedures include leveraging PowerShell-based malware, browser extensions for surveillance, and mobile malware. They use fake personas on social media platforms like LinkedIn and Twitter to establish trust and maintain long-term engagement with targets before executing credential theft.
Charming Kitten’s operations have been exposed by cybersecurity firms and government agencies globally. Notably, the U.S. Department of Justice indicted several Iranian nationals in 2019 for their involvement in international hacking and espionage campaigns.
Implement Multi-Factor Authentication (MFA): Prevent unauthorized credential use
Patch Management: Regularly update software to mitigate zero-day vulnerabilities
Endpoint Detection and Response (EDR): Leverage tools to identify malware signatures and anomalous network behavior
Segmentation Standards: Limit access between critical systems to contain any lateral movement
User Awareness Campaigns: Train employees to recognize phishing attempts and follow cybersecurity best practices
Segmentation Standards: Limit access between critical systems to contain any lateral movement
Huntress solutions help protect organizations by monitoring endpoints, detecting intrusions, and mitigating Charming Kitten threats with enterprise-grade technology.