Code Defence Cyber security

Iranian APT “Charming Kitten” Uses New Backdoor in Espionage Campaigns

The Iranian state-sponsored group Charming Kitten (aka APT35, Phosphorus) has been observed deploying a previously unseen backdoor named “GhostEcho.” The group uses sophisticated spear-phishing campaigns targeting academics, journalists, and human rights organizations, particularly those focused on Middle Eastern affairs.

Business Impact

Charming Kitten focuses on espionage and credential theft. A successful compromise can lead to the exfiltration of sensitive research, communications, contact lists, and long-term surveillance of targeted individuals and organizations, potentially undermining diplomatic efforts or compromising activists.

Why It Happened

Nation-state groups continuously develop new malware and refine their TTPs to evade detection by security tools and maintain persistence within target networks for intelligence gathering.

Recommended Executive Action

Ensure threat intelligence platforms are updated with IoCs for Charming Kitten and the “GhostEcho” backdoor. Remind high-risk employees (executives, researchers in relevant fields) to be extremely cautious of spear-phishing attempts and enable robust MFA on all accounts.

Hashtags: #APT #NationState #Iran #CharmingKitten #Espionage #SpearPhishing #ThreatIntel #CyberSecurity #InfoSec

Scroll to Top

Review My Order

0

Subtotal