New research from Picus Security has shed light on the ongoing operations of Ferocious Kitten, an Iranian advanced persistent threat (APT) group active since at least 2015. The group's primary mission is cyber-espionage, specifically targeting Iranian dissidents and activists. Their main tool is a custom-built remote access trojan (RAT) called MarkiRAT, which is delivered via spear-phishing campaigns. MarkiRAT is a potent surveillance tool designed for stealth and extensive data collection, featuring an intelligent keylogger, clipboard monitoring, and multiple defense evasion techniques. The group's sustained activity and specialized toolset demonstrate a dedicated, state-aligned effort to monitor and suppress political opposition.
Ferocious Kitten's campaigns are highly targeted. They use social engineering to craft convincing lures, often disguising their malicious documents as political papers or other content relevant to their targets. This focused approach increases the likelihood of a successful compromise.
The attack chain employed by Ferocious Kitten is methodical and designed for stealth:
T1566.001 - Spearphishing Attachment): The attack begins with a spear-phishing email containing a malicious Microsoft Office document. The document is weaponized using either embedded macros (T1059.005 - Visual Basic) or by exploiting known vulnerabilities like the MSHTML engine flaw (CVE-2021-40444).T1056.001 - Keylogging): The RAT includes an advanced logger that reportedly only activates when it detects the victim is not using a password manager, making it more stealthy.T1005 - Data from Local System): The malware can search for and exfiltrate specific files from the compromised system.T1071.001 - Web Protocols): MarkiRAT communicates with its C2 servers using standard HTTP and HTTPS GET/POST requests, which helps it blend in with normal web traffic.T1197 - BITS Jobs): Abusing the legitimate Windows Background Intelligent Transfer Service (BITS) to download payloads or exfiltrate data.T1564.002 - Hide Files and Directories): Using the RTLO Unicode character to disguise a malicious executable's file extension (e.g., making file.exe appear as file.txt).The primary impact of Ferocious Kitten's operations is not financial but political and personal. For the targeted individuals:
Specific IOCs (hashes, domains) were not provided in the source articles, but the malware family name is a key indicator.
| Type | Value | Description |
|---|---|---|
| Malware Family | MarkiRAT | Custom RAT used by Ferocious Kitten. |
powershell.exe, mshta.exe), the use of bitsadmin.exe, and files with the RTLO character. This aligns with D3FEND's Process Analysis.M1017 - User Training): Targeted individuals must be trained to be extremely cautious of unsolicited emails and attachments, even if they appear to come from a known contact.M1051 - Update Software): Keep operating systems and applications, especially Microsoft Office and web browsers, fully patched to prevent exploitation of known vulnerabilities.Training high-risk users to identify and report sophisticated spear-phishing attempts is a critical defense.
Use EDR to monitor for and block malicious behaviors like Office spawning shells or the abuse of BITSAdmin.
Mapped D3FEND Techniques:
Harden Microsoft Office configurations to disable macros from the internet by default.
Mapped D3FEND Techniques:
Implement egress filtering to restrict outbound connections to only what is necessary for business, potentially blocking C2 channels.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats