New Iran-Linked 'RedKitten' Group Targets Human Rights NGOs with AI-Suspected Malware

Farsi-Speaking Threat Actor 'RedKitten' Uses Sophisticated Malware in Espionage Campaign Against Human Rights Activists

MEDIUM
February 1, 2026
February 2, 2026
m read
Threat ActorMalwarePhishing

Related Entities(initial)

Threat Actors

RedKitten

Organizations

HarfangLab

Products & Tech

GitHubGoogle DriveMicrosoft ExcelTelegram

Full Report(when first published)

Executive Summary

Researchers at HarfangLab have identified a new cyber-espionage campaign attributed to a Farsi-speaking threat actor named RedKitten, believed to be aligned with Iranian state interests. The campaign, active in January 2026, specifically targets non-governmental organizations (NGOs) and individuals involved in documenting human rights abuses in Iran. The initial attack vector is a phishing email containing a malicious Microsoft Excel document. The malware is highly modular and leverages legitimate services—GitHub, Google Drive, and Telegram—for command-and-control (C2) and payload hosting, making it difficult to detect. The sophistication and structure of the malware have led researchers to suspect the use of Large Language Models (LLMs) in its development, signaling a potential evolution in threat actor capabilities.


Threat Overview

The RedKitten campaign is a politically motivated espionage operation designed to gather intelligence on and disrupt the activities of human rights organizations. The timing of the campaign coincides with a period of nationwide unrest in Iran, suggesting a direct link to the government's efforts to suppress dissent.

Attack Vector: The attack begins with a targeted phishing email. The email contains a 7-Zip archive with a Farsi filename, designed to look enticing to the target. Inside the archive is a Microsoft Excel file, which also has a lure-based filename (e.g., a list of deceased protesters). The Excel file contains malicious VBA macros.

Execution Flow:

  1. Lure: The victim is tricked into opening the Excel file and enabling macros.
  2. Downloader: The VBA macro acts as a downloader, connecting to a C2 server to fetch the next stage of the malware.
  3. Modular Malware: The main payload is modular and uses public services to operate:
    • Configuration & Payloads: It retrieves its configuration files and additional malicious modules from repositories on GitHub and folders in Google Drive.
    • Command and Control: It uses the Telegram messaging API for C2 communications, sending stolen data and receiving commands from the attackers. This traffic blends in with legitimate Telegram usage, making it difficult to block at a network level.

Technical Analysis

The most novel aspect of this campaign is the suspected use of AI in its creation. Researchers noted that the code's structure, comments, and overall orchestration were unusually clean and well-organized, leading them to hypothesize that an LLM may have assisted the developers. This could allow less-skilled actors to produce more sophisticated malware or enable advanced actors to accelerate their development lifecycle.

MITRE ATT&CK TTPs

Impact Assessment

  • Targeted Espionage: The primary impact is the theft of sensitive information from human rights organizations. This could include the identities of activists, sources, and victims of abuse, placing these individuals at extreme risk.
  • Chilling Effect: Successful cyberattacks against NGOs can create a chilling effect, discouraging activists from their work due to fear of surveillance and reprisal.
  • Threat Actor Evolution: If the use of LLMs for malware development is confirmed, it represents a significant evolution in the threat landscape. It could lower the barrier for creating sophisticated tools and increase the overall volume and quality of malware.

Cyber Observables for Detection

Type Value Description Context Confidence
network_traffic_pattern Outbound connections to api.telegram.org from non-browser processes. The malware uses the Telegram API for C2. Such traffic from unexpected processes is highly suspicious. Firewall logs, EDR network logs high
network_traffic_pattern Outbound connections to raw.githubusercontent.com or drive.google.com/uc The malware fetches payloads and configuration from GitHub and Google Drive. Proxy logs, DNS logs high
file_name *.xlsm The initial vector is a macro-enabled Excel file. Scrutinize all incoming .xlsm files. Email gateway, endpoint analysis medium
command_line_pattern powershell.exe -w hidden -enc VBA macros often use PowerShell to download and execute the next stage. Encoded commands are a common evasion tactic. EDR logs, PowerShell script block logging high

Detection & Response

  • Detect: Monitor network traffic for connections to api.telegram.org, github.com, and drive.google.com from unusual processes. Use an EDR solution to monitor for Office applications spawning shell or script processes (e.g., Excel.exe -> powershell.exe). Enable and analyze PowerShell script block logging (Event ID 4104) to deobfuscate and inspect executed commands.
  • Response: If a compromise is detected, isolate the host and block the identified C2 domains and IPs at the firewall. Preserve the initial phishing email and malicious document for forensic analysis. Investigate other hosts for similar activity, as the attackers may have moved laterally.

Mitigation

  • Block Macros: The most effective mitigation is to configure Microsoft Office to block all macros from the internet. (M1028 - Operating System Configuration)
  • User Training: Train high-risk users, such as those in NGOs, to identify and report phishing attempts. Emphasize the danger of opening unsolicited attachments and enabling macros. (M1017 - User Training)
  • Egress Filtering: Restrict outbound network connections to only what is required for business purposes. While blocking all of GitHub, Google Drive, and Telegram may not be feasible, monitoring and restricting access from server segments or non-developer workstations can be effective. (M1037 - Filter Network Traffic)
  • Application Control: Use application control to prevent unauthorized scripts and executables from running, which can stop the malware's execution chain even if the initial macro is enabled. (M1038 - Execution Prevention)

Timeline of Events

1
January 31, 2026
HarfangLab reports on the 'RedKitten' campaign active during January 2026.
2
February 1, 2026
This article was published

Article Updates

February 2, 2026

Severity increased

New details on RedKitten campaign reveal C# implant 'SloppyMIO' using password-protected Excel, steganography, and AppDomain Manager injection for stealth.

Further analysis of the RedKitten campaign identifies the C# implant as 'SloppyMIO'. Initial access is now confirmed via password-protected Excel spreadsheets, a technique used to bypass email gateway scanning. The malware employs advanced evasion tactics including steganography to hide its configuration and AppDomain Manager injection for stealthy execution. Persistence is achieved through scheduled tasks. These new technical details highlight increased sophistication and evasiveness, making detection and mitigation more challenging for targeted human rights NGOs and activists.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

AIEspionageIranMalwareNGOPhishingRedKittenTelegram

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading