Researchers at HarfangLab have identified a new cyber-espionage campaign attributed to a Farsi-speaking threat actor named RedKitten, believed to be aligned with Iranian state interests. The campaign, active in January 2026, specifically targets non-governmental organizations (NGOs) and individuals involved in documenting human rights abuses in Iran. The initial attack vector is a phishing email containing a malicious Microsoft Excel document. The malware is highly modular and leverages legitimate services—GitHub, Google Drive, and Telegram—for command-and-control (C2) and payload hosting, making it difficult to detect. The sophistication and structure of the malware have led researchers to suspect the use of Large Language Models (LLMs) in its development, signaling a potential evolution in threat actor capabilities.
The RedKitten campaign is a politically motivated espionage operation designed to gather intelligence on and disrupt the activities of human rights organizations. The timing of the campaign coincides with a period of nationwide unrest in Iran, suggesting a direct link to the government's efforts to suppress dissent.
Attack Vector: The attack begins with a targeted phishing email. The email contains a 7-Zip archive with a Farsi filename, designed to look enticing to the target. Inside the archive is a Microsoft Excel file, which also has a lure-based filename (e.g., a list of deceased protesters). The Excel file contains malicious VBA macros.
Execution Flow:
The most novel aspect of this campaign is the suspected use of AI in its creation. Researchers noted that the code's structure, comments, and overall orchestration were unusually clean and well-organized, leading them to hypothesize that an LLM may have assisted the developers. This could allow less-skilled actors to produce more sophisticated malware or enable advanced actors to accelerate their development lifecycle.
T1566.001 - Spearphishing Attachment: The use of a malicious Excel file in a targeted email.T1059.005 - Visual Basic: The VBA macro in the Excel file acts as the initial dropper.T1105 - Ingress Tool Transfer: The malware downloads additional modules from GitHub and Google Drive.T1071.001 - Web Protocols: The use of standard HTTPS to communicate with GitHub and Google Drive.T1132.002 - Web Service: The use of the Telegram API for C2 communications is a form of C2 over a legitimate web service.T1564.001 - Hidden Files and Directories: The malware likely hides its components on the victim's filesystem to evade detection.network_traffic_patternapi.telegram.org from non-browser processes.network_traffic_patternraw.githubusercontent.com or drive.google.com/ucfile_name*.xlsm.xlsm files.command_line_patternpowershell.exe -w hidden -encapi.telegram.org, github.com, and drive.google.com from unusual processes. Use an EDR solution to monitor for Office applications spawning shell or script processes (e.g., Excel.exe -> powershell.exe). Enable and analyze PowerShell script block logging (Event ID 4104) to deobfuscate and inspect executed commands.M1028 - Operating System Configuration)M1017 - User Training)M1037 - Filter Network Traffic)M1038 - Execution Prevention)New details on RedKitten campaign reveal C# implant 'SloppyMIO' using password-protected Excel, steganography, and AppDomain Manager injection for stealth.
Disabling macros from running on documents downloaded from the internet is the most effective way to block this initial access vector.
Mapped D3FEND Techniques:
Filtering and monitoring outbound web traffic can detect or block connections to known malicious infrastructure or unexpected services like the Telegram API.
Mapped D3FEND Techniques:
Educating high-risk users about the dangers of phishing emails, especially those with tempting or urgent lures, is crucial.
HarfangLab reports on the 'RedKitten' campaign active during January 2026.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.