CloudSEK analyzed a leaked dataset of Charming Kitten (APT35) operational materials showing Persian-language internal documents, personnel rosters, tooling details, and campaign reports that document coordinated teams for penetration, malware development, social engineering, infrastructure compromise, and rapid exploitation of CVE-2024-1709. The disclosure details long-term persistence, Active Directory domination, extensive exfiltration across government, legal, academic, aviation, energy, and financial sectors in the Middle East and beyond, highlighting IRGC-affiliated organized espionage and supply-chain risk. #CVE-2024-1709 #CharmingKitten
Keypoints
- CloudSEKâs TRIAD found a GitHub repository allegedly containing 100+ Persian-language internal documents from Charming Kitten (APT35), including timesheets, reports, and operational plans.
- The leak describes an organized structure with roles for penetration testing, malware development (custom RATs/RTM), social engineering, infrastructure, and management supporting coordinated campaigns.
- Operators rapidly weaponized CVE-2024-1709 (ConnectWise) within 24 hours and conducted mass modem/router DNS manipulation campaigns (580+ devices) and multi-country scanning.
- Reported tradecraft includes Active Directory domination, credential harvesting, EDR evasion (bypass of Sophos, Trend Micro, SentinelOne, CrowdStrike testing), supply-chain pivots, and long-term persistence with large-scale exfiltration (74GB+ documented).
- Targets span government, legal firms (Qistas, IBLaw), education (WISE University), aviation, energy, and financial sectors across Jordan, UAE, Saudi Arabia, Israel, and secondary regions including the USA and Asia.
- Social engineering infrastructure and ad-driven phishing campaigns were highly developed, with domain purchases, ads (Facebook, Google, X), SMS panels, forged documents, and SIM procurement to support large-scale phishing and smishing.
- High-confidence indicators in the dataset include Iranian calendar dates, Tehran-aligned operational hours, Persian naming conventions, infrastructure consistent with APT35, and documented personnel and project artifacts.
MITRE Techniques
- [T1190] Exploit Public-Facing Application â Used to gain initial access via multiple vulnerabilities including âCVE-2024-1709 (ConnectWise), CVE-2019-18935 (Telerik), CVE-2017-11317 (Telerik), CVE-2012-1823 (PHP CGI RCE), CVE-2017-3506 (Oracle WebLogic)â.
- [T1078] Valid Accounts â Creation and use of domain admin accounts and harvested credentials for persistence and lateral movement (âDomain admin account creationâ, âDatabase credentials (MySQL, Oracle)â).
- [T1059] Command and Scripting Interpreter â Use of automated exploit tools and custom scripts (Nuclei templates, RouterScan/RouterSploit auto-exploiters, WPScan, custom exploit automation development).
- [T1531] Account Discovery â Active Directory enumeration and share folder enumeration to map and escalate access (âActive Directory enumerationâ, âShare folder enumerator for AD environmentsâ).
- [T1210] Exploitation of Remote Services â Targeting of network equipment and remote services including routers, modems, Cisco RV devices, and Starlink equipment (âMass modem attack campaignâ, âCisco RV (Small Business) exploitationâ).
- [T1027] Obfuscated Files or Information â Use of obfuscated DLL payloads, DLL hijacking, and binary rewrite/obfuscation to evade detection (âObfuscated DLL payloadsâ, âDLL hijacking strategiesâ, âBinary rewrite capabilitiesâ).
- [T1486] Data Encrypted for Impact / Data Exfiltration (technique family) â Organized data staging and exfiltration of large datasets including database dumps, CCTV footage, and email archives (âMassive data exfiltration (74GB+ documented)â, âDatabase dumps via Adminerâ, âCCTV footage downloadsâ).
- [T1071] Application Layer Protocol â Use of cloud backup portals and online services for exfiltration and persistence (Acronis Cloud backup compromise, NextCloud for file sharing).
- [T1110] Brute Force â Credential harvesting and use of compromised credentials and browser credential theft for lateral movement and access to services (âCredential harvestingâ, âBrowser credential theftâ).
- [T1566] Phishing â Extensive phishing and social engineering infrastructure using ad platforms, fake e-commerce sites, Telegram channels, SMS panels, and forged documents (âSocial media campaign managementâ, âPhishing infrastructure developmentâ, âSMS panel research and acquisitionâ).
Indicators of Compromise
- [Document Artifacts] Persian-language internal docs and timesheets â example: âHSN2 daily reports (RTM Project folder)â, âMJD daily reports (Majid folder)â.
- [File Hashes] Report evidence hashes â example: â02120dcf3b263702028a0441881d339ee4ff8e15â, â4037e9382a99fdd96fe93eb0fd4380eea695bd3aâ.
- [Domains] Phishing/operational domains â example: âaecars.storeâ, âsunrapid.com (and lydston.com variants)â.
- [Vulnerabilities] Exploited CVEs â example: âCVE-2024-1709 (ConnectWise)â, âCVE-2019-18935 (Telerik)â.
- [Tooling/Names] Tool and project names â example: âRTM Project (custom RAT)â, âRouterSploit / RouterScan auto-exploitersâ.
- [Targets/Organizations] Targeted entities and operations â example: âQistas legal services (complete domain compromise, 74GB+ exfiltrated)â, âWISE University initial access (11,164+ student records)â.
Read more: https://www.cloudsek.com/blog/an-insider-look-at-the-irgc-linked-apt35-operations