Researchers at HarfangLab have identified a new cyber-espionage campaign attributed to a Farsi-speaking threat actor named RedKitten, believed to be aligned with Iranian state interests. The campaign, active in January 2026, specifically targets non-governmental organizations (NGOs) and individuals involved in documenting human rights abuses in Iran. The initial attack vector is a phishing email containing a malicious Microsoft Excel document. The malware is highly modular and leverages legitimate services—GitHub, Google Drive, and Telegram—for command-and-control (C2) and payload hosting, making it difficult to detect. The sophistication and structure of the malware have led researchers to suspect the use of Large Language Models (LLMs) in its development, signaling a potential evolution in threat actor capabilities.
The RedKitten campaign is a politically motivated espionage operation designed to gather intelligence on and disrupt the activities of human rights organizations. The timing of the campaign coincides with a period of nationwide unrest in Iran, suggesting a direct link to the government's efforts to suppress dissent.
Attack Vector: The attack begins with a targeted phishing email. The email contains a 7-Zip archive with a Farsi filename, designed to look enticing to the target. Inside the archive is a Microsoft Excel file, which also has a lure-based filename (e.g., a list of deceased protesters). The Excel file contains malicious VBA macros.
Execution Flow:
The most novel aspect of this campaign is the suspected use of AI in its creation. Researchers noted that the code's structure, comments, and overall orchestration were unusually clean and well-organized, leading them to hypothesize that an LLM may have assisted the developers. This could allow less-skilled actors to produce more sophisticated malware or enable advanced actors to accelerate their development lifecycle.
T1566.001 - Spearphishing Attachment: The use of a malicious Excel file in a targeted email.T1059.005 - Visual Basic: The VBA macro in the Excel file acts as the initial dropper.T1105 - Ingress Tool Transfer: The malware downloads additional modules from GitHub and Google Drive.T1071.001 - Web Protocols: The use of standard HTTPS to communicate with GitHub and Google Drive.T1132.002 - Web Service: The use of the Telegram API for C2 communications is a form of C2 over a legitimate web service.T1564.001 - Hidden Files and Directories: The malware likely hides its components on the victim's filesystem to evade detection.| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
network_traffic_pattern |
Outbound connections to api.telegram.org from non-browser processes. |
The malware uses the Telegram API for C2. Such traffic from unexpected processes is highly suspicious. | Firewall logs, EDR network logs | high |
network_traffic_pattern |
Outbound connections to raw.githubusercontent.com or drive.google.com/uc |
The malware fetches payloads and configuration from GitHub and Google Drive. | Proxy logs, DNS logs | high |
file_name |
*.xlsm |
The initial vector is a macro-enabled Excel file. Scrutinize all incoming .xlsm files. |
Email gateway, endpoint analysis | medium |
command_line_pattern |
powershell.exe -w hidden -enc |
VBA macros often use PowerShell to download and execute the next stage. Encoded commands are a common evasion tactic. | EDR logs, PowerShell script block logging | high |
api.telegram.org, github.com, and drive.google.com from unusual processes. Use an EDR solution to monitor for Office applications spawning shell or script processes (e.g., Excel.exe -> powershell.exe). Enable and analyze PowerShell script block logging (Event ID 4104) to deobfuscate and inspect executed commands.M1028 - Operating System Configuration)M1017 - User Training)M1037 - Filter Network Traffic)M1038 - Execution Prevention)New details on RedKitten campaign reveal C# implant 'SloppyMIO' using password-protected Excel, steganography, and AppDomain Manager injection for stealth.
Further analysis of the RedKitten campaign identifies the C# implant as 'SloppyMIO'. Initial access is now confirmed via password-protected Excel spreadsheets, a technique used to bypass email gateway scanning. The malware employs advanced evasion tactics including steganography to hide its configuration and AppDomain Manager injection for stealthy execution. Persistence is achieved through scheduled tasks. These new technical details highlight increased sophistication and evasiveness, making detection and mitigation more challenging for targeted human rights NGOs and activists.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats