Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists (an old strategy, with a new flavor)

Parkinsond

Level 62
Thread author
Verified
Well-known
Dec 6, 2023
5,063
14,270
6,069
A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses.

What makes the campaign noteworthy is the threat actor's likely reliance on large language models (LLMs) to build and orchestrate the necessary tooling.

The starting point of the attack is a 7-Zip archive with a Farsi filename that contains macro-laced Microsoft Excel documents. The XLSM spreadsheets claim to include details about protesters who died in Tehran between December 22, 2025, and January 20, 2026. But embedded within each of them is a malicious VBA macro, which, when enabled, functions as a dropper for a C#-based implant ("AppVStreamingUX_Multi_User.dll") by means of a technique called AppDomainManager injection.

The VBA macro, for its part, shows signs of being generated by an LLM due to the "overall style of the VBA code, the variable names and methods" used, as well as the presence of comments like "PART 5: Report the result and schedule if successful."

The attack is likely an effort to target individuals who are looking for information about missing persons, exploiting their emotional distress to provoke a false sense of urgency and trigger the infection chain. Analysis of the spreadsheet data, such as mismatched ages and birthdates, suggests it's fabricated.

 
Technical Analysis & Remediation

MITRE ATT&CK Mapping

Initial Access

T1566.001 (Spearphishing Attachment) – 7-Zip archives with malicious XLSM files.

Execution
T1204.002 (User Execution: Malicious File), T1059.005 (Visual Basic) – AI-generated VBA macros.

Persistence
T1546.015 (Component Object Model Hijacking) – AppDomainManager injection.

Command & Control
T1102 (Web Service) – Uses Telegram Bot API, GitHub, and Google Drive.

Defense Evasion
T1027.003 (Steganography) – Configuration data hidden in images on Google Drive.

CVE Profile

NVD/CISA Status

No specific CVE is exploited; this campaign relies on abuse of legitimate features (VBA Macros) and misconfiguration/design features (AppDomainManager) rather than software vulnerabilities.

Forensic Artifacts (The "Anchor")

Malware Implant
AppVStreamingUX_Multi_User.dll (C# implant dropped via macro).

Backdoor Name
SloppyMIO.

Network Indicator
whatsapp-meeting.duckdns[.]org (Phishing link for credential harvesting).

Technique
AppDomainManager injection.

Lure Context
"Tehran Forensic Medical Files" or lists of protesters deceased between Dec 22, 2025 – Jan 20, 2026.

Remediation - THE ENTERPRISE TRACK (SANS PICERL)

Identification & Containment


Network Block

Immediately block traffic to api.telegram[.]org and unapproved duckdns[.]org subdomains at the perimeter firewalls/web gateways.

Hunt
Query EDR for file writes to %LOCALAPPDATA%\Microsoft\CLR_v4.0_32\NativeImages\ matching the AppVStreamingUX_Multi_User.dll naming convention.

Registry Check
Audit .NET configuration for suspicious AppDomainManager registrations in the registry.

Eradication

Process Termination

Terminate any process spawning cmd[.]exe from unexpected parent processes (indicative of the cm module).

File Removal
Delete the malicious 7-Zip archives and the dropped DLLs. Remove the associated Scheduled Tasks used for persistence.

Recovery

Credential Reset

Force password resets for all accounts (especially Google and WhatsApp) on affected machines, as the campaign actively harvests credentials and 2FA codes.

Re-image
Due to the nature of the backdoor (System-level persistence), reimaging is recommended for compromised hosts.

Lessons Learned

Macro Policy

Enforce Group Policy to block macros from internet-originating files (Mark-of-the-Web).

Cloud C2 Detection
Implement SSL/TLS inspection to detect anomalous data exfiltration volumes to legitimate services like Google Drive.

Remediation - THE HOME USER TRACK

Priority 1: Safety (Disconnect & Scan)

Disconnect the infected device from the internet immediately to sever the Telegram C2 link.

Do not open any Excel files claiming to contain "protest details" or "forensic files".

Priority 2: Identity (Secure Accounts)
From a clean device, immediately change your Google and WhatsApp passwords.

Revoke any active "Linked Devices" in your WhatsApp settings, as the whatsapp-meeting[.]duckdns[.]org kit may have hijacked your session.

Priority 3: Persistence (Cleanup)
Check your "Task Scheduler" (search in Start Menu) for tasks running every two hours or tasks you do not recognize.

Run a full scan with a reputable non-signature-based antivirus solution (e.g., behavior-based detection).

Hardening & References

Baseline

CIS Benchmark for Microsoft Office (Disable VBA for internet files).

Framework
NIST SP 800-61r2 (Incident Handling Guide).

Tactical
Review HarfangLab's full report on SloppyMIO for YARA rules (referenced in).

Behavioral
Be skeptical of "Urgent" files regarding human rights or missing persons during times of civil unrest; verify the source via a secondary channel (Signal/Phone).

Sources

The Hacker News (Source Article)

HarfangLab (Technical Origin)

Contextual Intelligence & Geopolitics

Nariman Gharib Blog

U.S. Dept of Treasury

Amnesty International

Cloudflare
 
Last edited:

You may also like...