Farsi-Speaking Threat Actor 'RedKitten' Uses Sophisticated Malware in Espionage Campaign Against Human Rights Activists

New Iran-Linked 'RedKitten' Group Targets Human Rights NGOs with AI-Suspected Malware

MEDIUM
February 1, 2026
February 2, 2026
5m read
Threat ActorMalwarePhishing

Related Entities(initial)

Threat Actors

RedKitten

Organizations

HarfangLab

Products & Tech

Full Report(when first published)

Executive Summary

Researchers at HarfangLab have identified a new cyber-espionage campaign attributed to a Farsi-speaking threat actor named RedKitten, believed to be aligned with Iranian state interests. The campaign, active in January 2026, specifically targets non-governmental organizations (NGOs) and individuals involved in documenting human rights abuses in Iran. The initial attack vector is a phishing email containing a malicious Microsoft Excel document. The malware is highly modular and leverages legitimate services—GitHub, Google Drive, and Telegram—for command-and-control (C2) and payload hosting, making it difficult to detect. The sophistication and structure of the malware have led researchers to suspect the use of Large Language Models (LLMs) in its development, signaling a potential evolution in threat actor capabilities.


Threat Overview

The RedKitten campaign is a politically motivated espionage operation designed to gather intelligence on and disrupt the activities of human rights organizations. The timing of the campaign coincides with a period of nationwide unrest in Iran, suggesting a direct link to the government's efforts to suppress dissent.

Attack Vector: The attack begins with a targeted phishing email. The email contains a 7-Zip archive with a Farsi filename, designed to look enticing to the target. Inside the archive is a Microsoft Excel file, which also has a lure-based filename (e.g., a list of deceased protesters). The Excel file contains malicious VBA macros.

Execution Flow:

  1. Lure: The victim is tricked into opening the Excel file and enabling macros.
  2. Downloader: The VBA macro acts as a downloader, connecting to a C2 server to fetch the next stage of the malware.
  3. Modular Malware: The main payload is modular and uses public services to operate:
    • Configuration & Payloads: It retrieves its configuration files and additional malicious modules from repositories on GitHub and folders in Google Drive.
    • Command and Control: It uses the Telegram messaging API for C2 communications, sending stolen data and receiving commands from the attackers. This traffic blends in with legitimate Telegram usage, making it difficult to block at a network level.

Technical Analysis

The most novel aspect of this campaign is the suspected use of AI in its creation. Researchers noted that the code's structure, comments, and overall orchestration were unusually clean and well-organized, leading them to hypothesize that an LLM may have assisted the developers. This could allow less-skilled actors to produce more sophisticated malware or enable advanced actors to accelerate their development lifecycle.

MITRE ATT&CK TTPs

Impact Assessment

  • Targeted Espionage: The primary impact is the theft of sensitive information from human rights organizations. This could include the identities of activists, sources, and victims of abuse, placing these individuals at extreme risk.
  • Chilling Effect: Successful cyberattacks against NGOs can create a chilling effect, discouraging activists from their work due to fear of surveillance and reprisal.
  • Threat Actor Evolution: If the use of LLMs for malware development is confirmed, it represents a significant evolution in the threat landscape. It could lower the barrier for creating sophisticated tools and increase the overall volume and quality of malware.

Cyber Observables for Detection

Type
network_traffic_pattern
Value
Outbound connections to api.telegram.org from non-browser processes.
Description
The malware uses the Telegram API for C2. Such traffic from unexpected processes is highly suspicious.
Context
Firewall logs, EDR network logs
Confidence
high
Type
network_traffic_pattern
Value
Outbound connections to raw.githubusercontent.com or drive.google.com/uc
Description
The malware fetches payloads and configuration from GitHub and Google Drive.
Context
Proxy logs, DNS logs
Confidence
high
Type
file_name
Value
*.xlsm
Description
The initial vector is a macro-enabled Excel file. Scrutinize all incoming .xlsm files.
Context
Email gateway, endpoint analysis
Confidence
medium
Type
command_line_pattern
Value
powershell.exe -w hidden -enc
Description
VBA macros often use PowerShell to download and execute the next stage. Encoded commands are a common evasion tactic.
Context
EDR logs, PowerShell script block logging
Confidence
high

Detection & Response

  • Detect: Monitor network traffic for connections to api.telegram.org, github.com, and drive.google.com from unusual processes. Use an EDR solution to monitor for Office applications spawning shell or script processes (e.g., Excel.exe -> powershell.exe). Enable and analyze PowerShell script block logging (Event ID 4104) to deobfuscate and inspect executed commands.
  • Response: If a compromise is detected, isolate the host and block the identified C2 domains and IPs at the firewall. Preserve the initial phishing email and malicious document for forensic analysis. Investigate other hosts for similar activity, as the attackers may have moved laterally.

Mitigation

  • Block Macros: The most effective mitigation is to configure Microsoft Office to block all macros from the internet. (M1028 - Operating System Configuration)
  • User Training: Train high-risk users, such as those in NGOs, to identify and report phishing attempts. Emphasize the danger of opening unsolicited attachments and enabling macros. (M1017 - User Training)
  • Egress Filtering: Restrict outbound network connections to only what is required for business purposes. While blocking all of GitHub, Google Drive, and Telegram may not be feasible, monitoring and restricting access from server segments or non-developer workstations can be effective. (M1037 - Filter Network Traffic)
  • Application Control: Use application control to prevent unauthorized scripts and executables from running, which can stop the malware's execution chain even if the initial macro is enabled. (M1038 - Execution Prevention)

Timeline of Events

1
January 31, 2026
HarfangLab reports on the 'RedKitten' campaign active during January 2026.
2
February 1, 2026
This article was published

Article Updates

February 2, 2026

New details on RedKitten campaign reveal C# implant 'SloppyMIO' using password-protected Excel, steganography, and AppDomain Manager injection for stealth.

MITRE ATT&CK Mitigations

Disabling macros from running on documents downloaded from the internet is the most effective way to block this initial access vector.

Mapped D3FEND Techniques:

Filtering and monitoring outbound web traffic can detect or block connections to known malicious infrastructure or unexpected services like the Telegram API.

Mapped D3FEND Techniques:

Educating high-risk users about the dangers of phishing emails, especially those with tempting or urgent lures, is crucial.

Timeline of Events

1
January 31, 2026

HarfangLab reports on the 'RedKitten' campaign active during January 2026.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RedKittenIranEspionageMalwarePhishingNGOTelegramAI

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.