Nation-state cyber operations increasingly blur the line between espionage, psychological manipulation, and digital repression. A newly uncovered campaign—tracked as RedKitten—highlights this convergence, targeting human rights organizations, activists, and individuals documenting abuses in Iran.
Observed in January 2026 by HarfangLab, RedKitten appears aligned with Iranian state interests and coincides with nationwide unrest that erupted in late 2025 amid inflation, food shortages, and currency collapse. The campaign weaponizes emotionally charged lures, AI-assisted malware development, and legitimate cloud platforms to quietly compromise victims already under pressure.
This article breaks down:
- How the RedKitten campaign works end-to-end
- The malware tooling and command-and-control (C2) design
- The role of large language models (LLMs) in modern cyber espionage
- Attribution signals linking the activity to Iranian threat actors
- Defensive guidance for NGOs, journalists, and security teams
What Is the RedKitten Cyber Campaign?
RedKitten is a suspected Iran-linked cyber espionage operation focused on surveillance, data exfiltration, and long-term access rather than disruptive attacks.
Key Characteristics
- 🎯 Targets: Human rights NGOs, activists, researchers, journalists
- 🌍 Geographic focus: Iran and diaspora communities
- 🧠 Motivation: Intelligence gathering, monitoring dissent
- 🛠️ Tradecraft: Social engineering, cloud-native malware, stealthy persistence
The campaign reflects a broader pattern among Iranian threat groups: low-cost infrastructure, plausible deniability, and high psychological leverage.
Attack Chain Overview: From Emotional Lure to Full Compromise
The RedKitten infection chain is designed to exploit trust and urgency, particularly among individuals searching for information about missing or deceased protesters.
Step 1: Weaponized Excel Lures
Victims receive a 7-Zip archive with a Farsi filename containing:
- Macro-enabled Excel spreadsheets (
.XLSM) - Claims of documenting protesters killed in Tehran
- Date ranges spanning Dec 22, 2025 – Jan 20, 2026
Analysis reveals the data is fabricated, with mismatched ages and birthdates—indicating the lure’s sole purpose is infection.
Step 2: Malicious VBA Macros (Likely AI-Generated)
Once macros are enabled, a malicious VBA macro executes.
HarfangLab noted strong indicators of LLM-generated code, including:
- Unnatural variable naming conventions
- Modular structure with verbose comments
- Comments such as: “PART 5: Report the result and schedule if successful”
This suggests attackers are using AI tools to accelerate malware development and obfuscate attribution.
Malware Delivery via AppDomainManager Injection
The macro acts as a dropper for a C# implant named:
AppVStreamingUX_Multi_User.dll
Injection Technique: AppDomainManager Abuse
- Leverages the .NET
AppDomainManagermechanism - Executes malicious code during application initialization
- Bypasses some traditional application control defenses
This technique has been previously observed in Iranian-linked campaigns, reinforcing attribution confidence.
SloppyMIO Backdoor: Modular, Cloud-Native, Stealthy
The implanted malware—dubbed SloppyMIO—is a modular backdoor designed for flexibility and persistence.
Cloud-Based Command-and-Control Design
SloppyMIO avoids traditional C2 infrastructure by abusing trusted services:
- GitHub – Dead drop resolver
- Google Drive – Hosts images containing steganographic configuration data
- Telegram – Primary command-and-control channel via Bot API
This approach:
- Evades domain-based blocking
- Complicates attribution
- Blends malicious traffic with normal cloud usage
SloppyMIO Supported Modules
SloppyMIO supports at least five functional modules, dynamically fetched and cached.
| Module | Function | Impact |
|---|---|---|
cm | Execute commands via cmd.exe | Remote command execution |
do | Collect files and ZIP them | Data exfiltration |
up | Write files using image-encoded data | Payload deployment |
pr | Create scheduled tasks | Persistence |
ra | Start arbitrary processes | Malware execution |
Additional C2 Commands
The malware also supports higher-level instructions:
download– Triggers file collectioncmd– Executes shell commandsrunapp– Launches processes
All activity is reported back via Telegram chat IDs, enabling near real-time operator control.
Persistence and Surveillance Capabilities
SloppyMIO is designed for long-term access, not smash-and-grab theft.
Persistence Mechanism
- Scheduled task execution every two hours
- Survives reboots and user logouts
Surveillance Implications
Combined with file collection and command execution, this tooling supports:
- Monitoring activist communications
- Exfiltrating sensitive documentation
- Deploying secondary malware
Attribution: Ties to Iranian Threat Actors
While no attribution is absolute, multiple indicators point toward Iran-aligned actors.
Attribution Signals
- Farsi-language artifacts and filenames
- Lure themes tied to Iranian protests
- Use of Excel-based malware delivery
- AppDomainManager injection technique
Historical Parallels
RedKitten shares similarities with known campaigns by:
- Tortoiseshell – Excel-delivered IMAPLoader
- Nemesis Kitten – GitHub-based backdoor delivery
- Charming Kitten – Targeting activists and academics
These overlaps suggest shared tooling, training, or operational doctrine.
AI and LLMs: A Force Multiplier for Espionage
One of the most significant aspects of RedKitten is the apparent use of large language models.
Why This Matters
LLMs enable threat actors to:
- Rapidly generate malware code
- Reduce development errors
- Obfuscate developer “fingerprints”
- Scale operations with fewer skilled operators
For defenders, this means code style is no longer a reliable attribution signal.
Parallel Campaigns: WhatsApp and Gmail Phishing
RedKitten activity coincides with separate but related phishing campaigns targeting Iranian activists abroad.
WhatsApp Web Phishing via QR Codes
A phishing site impersonates WhatsApp Web and:
- Serves a live QR code from the attacker’s session
- Tricks victims into authenticating the attacker
- Grants full access to the victim’s WhatsApp account
The page also requests permissions for:
- Camera
- Microphone
- Geolocation
Effectively turning the browser into a surveillance tool.
Gmail Credential Harvesting
Another phishing flow targets Gmail accounts, stealing:
- Passwords
- 2FA codes
Approximately 50 victims have been identified, spanning:
- Kurdish community members
- Academics
- Government and business leaders
Broader Context: Iran’s Cyber Ecosystem and Human Capital
These findings follow major leaks involving Charming Kitten and revelations about Kashef, a surveillance platform linked to the IRGC.
They also intersect with disclosures around Ravin Academy, a sanctioned entity used to:
- Train cybersecurity professionals
- Vet and recruit talent
- Indirectly support MOIS cyber operations
This outsourcing model allows Iranian intelligence to scale capability while maintaining plausible deniability.
Defensive Guidance: What NGOs and Security Teams Should Do
Immediate Mitigations
- Disable Office macros by default
- Block AppDomainManager abuse where possible
- Restrict outbound access to Telegram where feasible
Detection Opportunities
- Monitor for unusual Excel macro execution
- Alert on scheduled task creation
- Inspect outbound traffic to cloud services for anomalies
Strategic Recommendations
- Apply zero trust principles to user endpoints
- Conduct targeted phishing resilience training
- Align incident response plans with NIST SP 800-61
- Map activity to MITRE ATT&CK (TA0001, TA0002, TA0011)
Frequently Asked Questions (FAQs)
What is the RedKitten cyber campaign?
RedKitten is a suspected Iran-linked cyber espionage operation targeting NGOs and activists using malware-laced Excel documents.
How does RedKitten deliver malware?
Via macro-enabled Excel spreadsheets that drop a C# backdoor using AppDomainManager injection.
What makes this campaign unique?
Its use of AI-generated code, cloud-native C2 (GitHub, Google Drive, Telegram), and emotionally manipulative lures.
Is this ransomware?
No. The campaign focuses on surveillance, intelligence collection, and persistence.
Who is most at risk?
Human rights organizations, activists, journalists, researchers, and diaspora communities.
Conclusion
The RedKitten cyber campaign underscores how modern cyber espionage blends human vulnerability, AI-assisted tooling, and trusted platforms to suppress dissent and collect intelligence at scale.
For defenders, the lesson is clear:
Threats are no longer just technical—they’re psychological, contextual, and deeply human.
Organizations operating in sensitive political or humanitarian spaces must assume they are targets and design security programs accordingly.
👉 Next step: Conduct a targeted threat model for activist-facing workflows and reassess macro, cloud, and messaging platform exposure.