[threat-actors] Add Ferocious Kitten

This commit is contained in:
Mathieu4141 2024-02-05 09:20:11 -08:00
parent 3a44200a0c
commit 957e848a6f

View file

@ -14895,6 +14895,17 @@
},
"uuid": "97f40858-1582-4a59-a990-866813982830",
"value": "CardinalLizard"
},
{
"description": "Ferocious Kitten is an APT group that has been active against Persian-speaking individuals since 2015 and appears to be based in Iran. Although it has been active over a large timespan, the group has mostly operated under the radar until a lure document was uploaded to VirusTotal and was brought to public knowledge by researchers on Twitter. Subsequently, one of its implants was analyzed by a Chinese intelligence firm. Kaspersky then expanded some of the findings on the group and provided insights on additional variants. The malware dropped from the aforementioned document is dubbed MarkiRAT and is used to record keystrokes and clipboard content, provide file download and upload capabilities as well as the ability to execute arbitrary commands on the victims machine. Kaspersky were able to trace the implant back to at least 2015, along with variants intended to hijack the execution of the Telegram and Chrome applications as a persistence method. Interestingly, some of the TTPs used by this threat actor are reminiscent of other groups operating in the domain of dissident surveillance. For example, it used the same C2 domains across its implants for years, which was witnessed in the activity of Domestic Kitten. In the same vein, the Telegram execution hijacking technique observed in this campaign by Ferocious Kitten was also observed being used by Rampant Kitten, as covered by Check Point.",
"meta": {
"country": "IR",
"refs": [
"https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/"
]
},
"uuid": "f34962a4-a792-4f23-af23-a8bf0f053fcf",
"value": "Ferocious Kitten"
}
],
"version": 299