Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
Ferocious Kitten is an Iranian-aligned advanced persistent threat (APT) group first identified in 2015. This group primarily engages in cyber espionage operations, with a focus on Middle Eastern targets but has been observed reaching into global networks. Known for using malicious Telegram applications as a lure, Ferocious Kitten is affiliated with broader Iranian state-backed activity clusters. Their primary methods include surveillance malware, phishing, and social engineering campaigns.
Primarily engages in cyber espionage campaigns to gather intelligence on dissidents, regional rivals, and geopolitical targets.
Weaponized Telegram applications embedding malware.
Credential theft and spyware installation.
Social engineering through fake messaging apps.
Deployment of custom malware such as MarkiRAT.
Malicious updates through compromised apps.
Covert surveillance of targets' communications.
No arrests or takedowns have been publicly attributed to Ferocious Kitten activity.
Enforcing mobile device management (MDM) to block unauthorized apps.
Continuous endpoint monitoring to detect spyware and RAT behavior.
User education on avoiding unofficial app sources and phishing.
Leveraging Huntress’s managed endpoint detection and response (EDR) to proactively identify malicious behaviors like RAT installation and exfiltration.
Huntress solutions help protect organizations by monitoring endpoints, detecting intrusions, and mitigating Ferocious Kitten threats withenterprise-grade technology.