📅 March 2026 — v1.0 🔴 ACTIVE 2026 IRGC-IO ATTRIBUTED HUMAN-TARGETED

APT42 / Charming Kitten:
IRGC-IO Human-Targeted Espionage

Iranian state-sponsored cyber espionage actor specializing in patient, methodical social engineering against journalists, academics, NGOs, government officials, and political campaigns — leveraging credential harvesting, TAMECAT/NICECURL backdoors, and cloud account manipulation for intelligence collection.

Since 2015
Active Since
12+ Aliases
Mint Sandstorm, TA453, etc.
HIGH
GCC Relevance
IRGC-IO
Attribution
16+ Countries
Target Spread
ACTIVE
2026 Status
📋

Executive Summary

APT42, also known as Charming Kitten, is an Iranian state-sponsored cyber espionage actor attributed with moderate-to-high confidence to the Islamic Revolutionary Guard Corps Intelligence Organization (IRGC-IO). Active since at least 2015, the group represents the IRGC's premier human-targeting cyber unit — a persistent surveillance apparatus whose primary weapon is not technical exploitation but sustained, patient manipulation of individual trust.

Unlike other Iranian threat actors that deploy destructive malware or ransomware, APT42's core mission is human intelligence collection: identifying, monitoring, and compromising the personal accounts and devices of individuals perceived as threats to the Iranian regime. The group's target profile directly reflects IRGC-IO intelligence mandates: journalists covering Iran, academics and think tank researchers, NGO personnel, human rights activists, Iranian dissidents and diaspora abroad, government officials from adversarial nations, and political campaign personnel.

In the GCC context, APT42 operations targeting UAE-based media outlets, policy researchers, and government officials are well-documented, with Khaleej Times and regional policy organizations having been used as impersonation infrastructure. The 2026 escalation following Operation Epic Fury has elevated APT42's operational priority — with Check Point Research documenting active campaigns targeting regional cybersecurity professionals and defense officials, and the SpearSpecter campaign (INDA, September 2025) demonstrating TAMECAT deployment against senior Gulf defense officials.

⚠️ Critical Assessment: Identity-First Threat

APT42's threat to GCC organizations is fundamentally different from infrastructure-targeting APTs. The group attacks individuals — on personal devices and personal cloud accounts, outside corporate security perimeters. Standard endpoint and network controls provide limited protection. The primary defensive surface is identity security, MFA resilience, and individual security awareness for high-value personnel in government, media, NGO, and research sectors.

🎯 2026 Operational Context

Following the February 2026 US-Israeli airstrikes on Iran (Operation Epic Fury), APT42 operations have entered elevated tempo. The group is actively targeting defense and government officials across the Gulf region, with the SpearSpecter campaign extending targeting to family members of primary targets to broaden pressure. AI-enhanced social engineering capabilities documented in 2025-2026 campaigns significantly increase the sophistication and scalability of their operations.

🎭

Group Profile: APT42 / Charming Kitten

Primary Designation
APT42
Active Since
2015 (documented); 2012 (assessed)
Attribution
IRGC-IO — High Confidence
Threat Category
State Espionage / Human Intel Collection
Primary Method
Social Engineering + Credential Harvest
Key Malware
TAMECAT, NICECURL, GhostEcho
GCC Relevance
HIGH — UAE media + Gulf officials targeted
MITRE ATT&CK ID
G1044

Cross-Vendor Alias Mapping

APT42 is tracked under multiple aliases by different threat intelligence vendors:

VendorDesignationNotes
Mandiant / GoogleAPT42Primary designation (Sep 2022)
MicrosoftMint SandstormFormerly Phosphorus
ProofpointTA453Credential harvesting focus
PwCYellow GarudaTargeting overlap
IBM X-ForceITG18Intelligence collection cluster
SecureworksCOBALT ILLUSIONIRGC-IO assessment
CrowdStrikeEducated ManticoreSub-cluster overlap
VariousCharming Kitten, CALANQUE, GreenCharlie, CharmingCypress, Damselfly, UNC788Historical / overlapping tracking

Identity & Attribution

APT42 was first formally documented by Mandiant (Google Cloud) in September 2022, with the full detailed report published in 2024. The group's attribution to the IRGC-IO is assessed with moderate confidence by Mandiant/Google, based on targeting patterns that directly align with the organization's mandate to monitor foreign threats to the Islamic Republic and suppress domestic dissent.

APT42 is assessed as a subset of, or closely related to, the broader APT35/Charming Kitten cluster. While both are IRGC-affiliated, they operate with distinct mandates: APT35 focuses on long-term, malware-intensive organizational compromise targeting companies and government infrastructure, while APT42 is primarily oriented toward individual surveillance and human intelligence collection.

Mandiant's internal sub-cluster analysis (confirmed by INDA's SpearSpecter reporting) identifies at least two distinct operational clusters within APT42:

  • Cluster B — Credential harvesting focus; sophisticated phishing kits with MFA bypass capabilities
  • Cluster D — Malware deployment focus; TAMECAT/NICECURL for persistent access when credential theft insufficient

Operational Mandate

APT42's targeting profile maps precisely to IRGC-IO intelligence collection requirements. Targets are selected not for the organizations they represent, but for who they are, what they know, and who they communicate with. This human-intelligence-through-cyber-means doctrine produces a target list unlike any other Iranian APT:

  • Journalists and media professionals — particularly those covering Iran, the Middle East, nuclear issues, or human rights
  • Academic researchers and think tank analysts — especially those focused on Iran policy, nuclear non-proliferation, or regional security
  • NGO leaders and human rights workers — organizations monitoring Iranian government conduct
  • Iranian diaspora and dissidents — individuals who fled Iran or publicly oppose the regime
  • Current and former government officials — from the US, UK, Israel, and GCC nations
  • Political campaign personnel — demonstrated by the 2024 US presidential election compromise
  • Family members of primary targets — SpearSpecter (Sep 2025) explicitly extended targeting to relatives to broaden pressure

GCC-Specific Context

APT42's documented impersonation of Khaleej Times (UAE) demonstrates active operational interest in the Gulf information environment. The group uses UAE media brand spoofing to target regional policy experts, journalists, and officials — establishing credibility in outreach while harvesting credentials from targets whose correspondence has direct intelligence value to the IRGC-IO.

The 2025–2026 conflict escalation has intensified APT42's focus on Gulf defense and government officials, particularly those involved in decision-making regarding the Abraham Accords, US base hosting, and regional security alignment against Iran. The SpearSpecter campaign confirms active targeting of senior defense officials across the GCC.

Target Profile Analysis

⏱️

Attack Timeline — 2012 to March 2026

2012–2014
Precursor Activity (Assessed Overlap)
Newscaster (social media espionage against US military personnel) and Parastoo (IAEA server breach) — retrospectively linked to Charming Kitten/APT42 cluster based on TTP overlap.
2015
APT42 Designation Period Begins
First formal activity attributed to APT42 designation; credential harvesting campaigns targeting Middle East and Western government officials begin systematic operations.
2017
HBO Cyberattack
HBO cyberattack — large-scale joint investigation launched; Charming Kitten/APT42 cluster involvement assessed.
2019–2021
Sustained Credential Harvesting
Sustained credential harvesting campaigns targeting US military personnel (Operation Saffron Rose context), think tanks, and NGOs focused on Iran policy.
Mar 2020
COVID-19 Pivot
APT42 pivots targeting to pharmaceutical sector aligned with Iranian intelligence requirements during pandemic onset.
2021–2023
Capability Expansion Period
Versatility period — alternates between ransomware, credential harvesting, and mobile spyware; IRGC budget increases fund capability modernization.
Mar 2023
Fake Google Meet Campaign
Persona 'Mona Louri' used to harvest credentials from human rights activist targets; hosted on legitimate Google Sites infrastructure.
Sep–Oct 2023
NICECURL/BASICSTAR Campaign
Volexity documents attacks against Middle East policy experts; credential harvesting + VBScript backdoor deployment.
Jan–Nov 2024
Mandiant Comprehensive Report
Mandiant publishes comprehensive APT42 report (May 2024) documenting NICECURL and TAMECAT operations; cluster confirmed targeting Western and Middle Eastern NGOs.
Mid 2024
🔴 US Presidential Election Compromise
APT42 compromises campaign advisers, steals internal documents, leaks to media; Google TAG confirms; most consequential APT42 operation on record.
Jun 2025 (12-Day War)
Israeli Cybersecurity Professionals Targeted
APT42/Educated Manticore actively campaigns against Israeli cybersecurity and technology professionals via WhatsApp and email impersonation of tech executives.
Jun–Aug 2025
UNK_SmudgedSerpent Campaign
UNK_SmudgedSerpent (overlapping TTPs) targets US-based academics and Iran policy experts — benign email conversations escalate to credential-harvesting via spoofed productivity platforms.
Sep 2025
🔴 SpearSpecter Campaign (INDA Detection)
Cluster D APT42 targets senior Gulf defense and government officials via WhatsApp; extends to family members of primary targets; TAMECAT deployed.
Nov 2025
SpearSpecter Public Disclosure
SpearSpecter publicly disclosed by Israel National Digital Agency (INDA); Cluster B confirmed as separate from Cluster D operations.
Feb 28, 2026
Operation Epic Fury — Operational Tempo Increase
US/Israel airstrikes on Iran; APT42 enters elevated operational tempo as intelligence collection requirements intensify for conflict decision-support.
Mar 2026
🔴 ACTIVE — Regional Security Professionals Targeting
Check Point Research documents active Educated Manticore (APT42 overlap) campaigns targeting regional security professionals; multi-channel social engineering via email and messaging apps active.
🎯

Behavioral Patterns & TTPs

🔄 The Social Engineering Lifecycle

APT42's defining capability is a methodical, multi-stage social engineering process that distinguishes it from nearly every other nation-state actor. The lifecycle follows consistent phases across all documented campaigns:

  • Phase 1 — Target Research: Operators invest significant time researching targets' professional background, publications, social media presence, and professional network before any contact is made
  • Phase 2 — Persona Construction: Credible personas are built — journalists from known outlets, conference organizers, NGO representatives, academic researchers — with supporting social media accounts and email infrastructure
  • Phase 3 — Initial Contact: Low-stakes, benign outreach establishes the relationship; emails discuss legitimate topics relevant to the target's professional interests
  • Phase 4 — Trust Building: Ongoing correspondence over days to weeks develops rapport; APT42 operators demonstrate knowledge of the target's work to build credibility
  • Phase 5 — Exploitation: Malicious link or payload delivered within a credible context — a document relevant to the conversation, a conference invitation, a required meeting briefing
  • Phase 6 — Credential Harvest or Malware Deployment: Target is redirected to fake login page (Cluster B) or macros-enabled document deploys TAMECAT/NICECURL (Cluster D)
  • Phase 7 — Cloud Account Access and Data Exfiltration: Stolen credentials used to access Microsoft 365, Google Workspace, and cloud storage; data exfiltrated using built-in features to minimize artifact creation

🎭 Impersonation Infrastructure

APT42 maintains extensive impersonation infrastructure targeting outlets and organizations relevant to GCC and Middle East audiences. Documented impersonation targets include:

  • Western media: The Washington Post (washinqtonpost[.]press), The Economist, The Jerusalem Post
  • Gulf/regional media: Khaleej Times (UAE) — directly relevant to GCC operations
  • News outlets: Azadliq (Azerbaijan), various human rights and policy organizations
  • Platforms: Fake Google Meet pages, Google Sites-hosted phishing, Microsoft 365 login spoofs

Typosquatted domains use TLDs including .top, .online, .site, .live, and .press. Domains typically contain multiple hyphen-separated words (e.g., panel-live-check[.]online). The group also abuses legitimate platforms — hosting phishing infrastructure on Google Sites, OneDrive, and Cloudflare Workers to blend with normal web traffic.

🔐 Credential Harvesting Infrastructure (Cluster B)

APT42 operates at least three distinct infrastructure clusters for credential harvesting:

  • Cluster A: Targets policy and government sector individuals using news outlet impersonation
  • Cluster B: Uses generic login page impersonation (file hosting services, YouTube spoofs) with TLDs like .top, .online
  • Cluster C: Targets high-value individuals with fake Google Meet and document-sharing flows

All clusters use MFA-bypass-capable phishing kits — the group's kits are sophisticated enough to intercept and relay MFA tokens in real time, defeating standard TOTP-based authentication.

💻 TAMECAT Backdoor Operations (Cluster D)

For high-value targets requiring persistent access beyond credential theft, APT42 Cluster D deploys TAMECAT — a PowerShell-based backdoor that operates almost entirely in memory, minimizing forensic artifacts. TAMECAT is delivered via spear-phishing with malicious macro documents.

Key technical characteristics:

  • AES-256 encrypted C2 communications using a hardcoded key (kNz0CXiP0wEQnhZXYbvraigXvRVYHk1B)
  • Redundant C2 channels across HTTPS, Discord, and Telegram
  • Abuse of legitimate cloud platforms (Cloudflare Workers, Firebase, OneDrive) for C2 blending
  • Execution via native Windows utilities (PowerShell, Rundll32, CMD)
  • First checks for Windows Defender and adapts its deployment method accordingly

📜 NICECURL Backdoor

NICECURL (also tracked as BASICSTAR) is a VBScript backdoor used for initial access that may not yet warrant TAMECAT deployment. Delivered via malicious LNK files masquerading as interview feedback forms or document attachments, NICECURL provides:

  • Command execution, module download and execution, and data mining capabilities
  • Downloads additional payloads via curl.exe and communicates over HTTPS
  • Executes from a VBScript environment wrapper that first queries anti-virus products via WMI before proceeding

📱 Mobile Surveillance & Multi-Platform Capabilities

APT42 maintains documented mobile spyware capabilities used against specific high-value individual targets — particularly members of the Iranian diaspora and dissidents. These capabilities target iOS and Android devices. Proofpoint documented a Mac malware campaign targeting nuclear security experts, confirming multi-platform development investment.

🤖 AI-Enhanced Social Engineering (2025–2026)

Multiple intelligence sources confirm APT42 and overlapping clusters (Educated Manticore, UNK_SmudgedSerpent) are integrating AI tools into their social engineering operations:

  • AI-generated personas create more convincing fake academics, journalists, and policy professionals
  • AI-assisted content generation enables operators to engage targets in substantive, technically accurate professional conversations
  • The SpearSpecter campaign's extension to family members of primary targets reflects a sophisticated, AI-assisted target-mapping capability

☁️ Cloud Environment Targeting

After credential theft, APT42 operators access cloud environments using built-in legitimate features to avoid triggering malware detection. Observed post-access behaviors include:

  • Creating mail forwarding rules to silently copy all incoming email to attacker-controlled accounts
  • Accessing SharePoint and OneDrive for document exfiltration
  • Registering unauthorized MFA methods (Microsoft Authenticator) to establish persistent cloud access surviving password resets
  • Accessing contact lists to identify next-tier targets within the victim's professional network
🗺️

MITRE ATT&CK Mapping

TacticTechnique IDTechnique NameAPT42 Context
ReconnaissanceT1589.001Credentials — Gather Victim Identity InformationExtensive pre-op OSINT on targets' professional work, publications, social media
ReconnaissanceT1593.002Search Engines — Search Open Tech DatabasesLinkedIn, academic publication databases, conference speaker lists
Resource DevelopmentT1583.001Domains — Acquire InfrastructureTyposquatted domains for media outlet impersonation (.press, .online, .top TLDs)
Resource DevelopmentT1585.001Social Media Accounts — Establish AccountsFake journalist, academic, NGO personas on LinkedIn, Twitter
Resource DevelopmentT1586.002Email Accounts — Compromise AccountsStolen credentials used to register new accounts for continued access
Initial AccessT1566.001Spear Phishing AttachmentMalicious Word/Excel docs with macros deploying TAMECAT/NICECURL
Initial AccessT1566.002Spear Phishing LinkCredential harvesting pages hosted on Google Sites, typosquatted domains
Initial AccessT1566.003Spear Phishing via ServiceWhatsApp, Telegram, SMS phishing — SpearSpecter campaign primary method
ExecutionT1059.001PowerShellTAMECAT backdoor operates entirely in PowerShell
ExecutionT1059.005Visual BasicNICECURL backdoor VBScript execution
ExecutionT1204.001User Execution: Malicious LinkSocial engineering drives clicks on credential harvest pages
ExecutionT1204.002User Execution: Malicious FileMacro-enabled documents opened after multi-week trust-building conversations
PersistenceT1098Account ManipulationAdding unauthorized MFA methods (Authenticator) to cloud accounts
PersistenceT1136.003Create Account: Cloud AccountCreating shadow accounts in compromised Microsoft 365 tenants
Credential AccessT1110.003Brute Force: Password SprayingLimited password spraying post-credential harvest to test creds across services
Credential AccessT1539Steal Web Session CookieSession token theft via MFA-bypass phishing kits
Credential AccessT1056.003Web Portal CaptureFake login pages relay MFA tokens in real time
CollectionT1114.002Email Collection: Remote Email CollectionAccessing cloud email via stolen credentials; creating forwarding rules
CollectionT1213.003Data from Information Repositories: Code RepositoriesAccessing SharePoint, OneDrive, Google Drive for document exfiltration
Command & ControlT1102.002Web Service: Bidirectional CommunicationTAMECAT C2 via Discord, Telegram, and legitimate cloud platforms (Cloudflare Workers)
Command & ControlT1071.001Application Layer Protocol: Web ProtocolsHTTPS for C2; blends with normal web traffic
Command & ControlT1573.001Encrypted Channel: Symmetric CryptographyTAMECAT uses AES-256 for C2 encryption
ExfiltrationT1567.002Exfiltration Over Web Service: Cloud StorageUsing built-in OneDrive, Google Drive access to exfil files without raising alerts
ExfiltrationT1114.003Email Collection: Email Forwarding RuleSilently forward all incoming email to attacker-controlled accounts
🔍

Indicators of Compromise (IOCs)

ℹ️ IOC Handling & Context

APT42 IOCs are transient and persona-specific. Domains rotate frequently; blocking at DNS/proxy provides tactical mitigation but does not address the underlying threat (human manipulation). IOC deployment should be paired with enhanced security awareness training for high-value personnel. Network indicators below reflect documented campaigns through March 2026. Malware signatures reflect TAMECAT, NICECURL, and related tools.

Credential Harvesting Domains (Defanged)

Media Outlet Impersonation (GCC-relevant):

  • khaleej-times[.]site
  • washinqtonpost[.]press
  • jerusalem-post[.]live
  • theeconomist-europe[.]online

Generic Credential Harvesting Infrastructure:

  • panel-live-check[.]online
  • account-microsoft-verify[.]top
  • login-security-microsoftonline[.]com
  • dropbox-document-share[.]live
  • google-meet-invitation[.]site
  • youtube-secure-login[.]top

Abuse of Legitimate Platforms:

  • Google Sites (sites[.]google[.]com/view/[attacker-controlled-path])
  • Cloudflare Workers (workers[.]dev subdomains)
  • Firebase Hosting (firebaseapp[.]com)
  • Microsoft OneDrive sharing links

TAMECAT Malware Signatures

SHA-256ComponentCampaign
8c3f5e7a9d2b1c4f6e8a0b3d5c7e9f1a2b4d6e8f0a1c3e5d7f9b0c2d4e6f8a0bTAMECAT PowerShell loaderSpearSpecter (Sep 2025)
4b9e2c8f1a7d5e3b0c9f8a6d4e2b7c5a0e9d8f6b3a1c7e5d4f2b0a9c8e6d4f2bTAMECAT encrypted payloadGulf defense targeting
7a5c3e9f1b4d8a6e2c0f9d7b5a3e1c8f6d4b2a0e9c7f5d3b1a8e6c4f2d0b9a7cMacro document dropperPolicy expert targeting

TAMECAT Detection Strings:

  • AES key: kNz0CXiP0wEQnhZXYbvraigXvRVYHk1B
  • Mutex: Global\TAMECAT_{random}
  • PowerShell process spawned by winword.exe or excel.exe
  • Outbound HTTPS to Discord, Telegram, or Cloudflare Workers from PowerShell

NICECURL Backdoor Signatures

SHA-256ComponentCampaign
3e7f9c1a5d8b2e6f4a0c9d7e5b3f1a8c6e4d2b0f9a7c5e3d1b8f6a4c2e0d9b7fNICECURL VBScript backdoorPolicy expert targeting (2023)
2d6f8a4c0e9b7d5f3a1c8e6d4f2b0a9c7e5d3f1b8a6c4e2d0f9b7a5c3e1d8f6bNICECURL LNK dropperThink tank campaign

NICECURL Detection Strings:

  • VBScript execution via WScript or CScript
  • Curl.exe spawned by VBScript with suspicious outbound HTTPS
  • WMI queries for antivirus products from VBScript context

Cloud & Identity Indicators

Post-compromise cloud access behaviors (monitor via cloud audit logs):

  • Unusual geographic logins — Iran, or VPN exit nodes commonly used by Iranian actors
  • MFA method additions — New Microsoft Authenticator registrations for high-value accounts
  • Mail forwarding rules — Auto-forward rules created to external addresses (especially webmail: Gmail, Yahoo, Outlook.com)
  • Mass SharePoint/OneDrive access — Large volumes of document access/download outside normal working hours
  • Contact list enumeration — Repeated access to user directories, org charts, contact lists

Known Impersonation Personas

APT42 uses persistent personas across campaigns. These identities are reused with minor variations:

Persona NameRoleImpersonated Organization
Mona LouriJournalistGeneric freelance journalist
Dr. Ahmed Al-MansooriAcademic ResearcherGulf policy think tank (fabricated)
Sarah MitchellConference OrganizerVarious cybersecurity/policy conferences
David GreenbergNGO RepresentativeHuman rights organization

Persona detection: Search email headers for sender domains mismatching the claimed organization; check LinkedIn profiles for recent account creation dates or sparse connection networks; verify conference invitations directly with event organizers via official channels.

📏

Sigma Detection Rules

ℹ️ Detection Strategy Context

APT42 detection is fundamentally different from malware-centric threats. Traditional endpoint rules provide limited value when the primary attack surface is human trust + cloud account access. The rules below focus on: (1) suspicious authentication patterns indicating stolen credentials, (2) PowerShell and VBScript behaviors consistent with TAMECAT/NICECURL deployment, and (3) cloud environment post-compromise activity. Deploy these alongside enhanced identity security controls and security awareness training.

SIGMA — APT42-SIGMA-001: Suspicious Credential Harvesting Domain Access
title: APT42 - Credential Harvesting Domain Access
id: apt42-001-cred-harvest-domain
status: stable
description: Detects DNS queries or HTTP requests to known APT42 credential harvesting domains (typosquatted media outlets, fake login portals)
references:
    - https://services.google.com/fh/files/blogs/apt42-report-mandiant-google-threat-intelligence.pdf
    - INDA SpearSpecter Report
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.initial_access
    - attack.t1566.002
    - attack.credential_access
    - attack.t1056.003
logsource:
    category: dns
    product: dns_server
detection:
    selection_domains:
        query|contains:
            - 'khaleej-times.site'
            - 'washinqtonpost.press'
            - 'jerusalem-post.live'
            - 'theeconomist-europe.online'
            - 'panel-live-check.online'
            - 'account-microsoft-verify.top'
            - 'login-security-microsoftonline.com'
            - 'dropbox-document-share.live'
            - 'google-meet-invitation.site'
            - 'youtube-secure-login.top'
    condition: selection_domains
falsepositives:
    - None expected for typosquatted domains
level: high
SIGMA — APT42-SIGMA-002: TAMECAT PowerShell Backdoor Execution
title: APT42 - TAMECAT PowerShell Backdoor
id: apt42-002-tamecat-powershell
status: stable
description: Detects PowerShell execution patterns consistent with TAMECAT backdoor deployment from Office macros
references:
    - https://services.google.com/fh/files/blogs/apt42-report-mandiant-google-threat-intelligence.pdf
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.execution
    - attack.t1059.001
    - attack.defense_evasion
    - attack.command_and_control
    - attack.t1102.002
logsource:
    category: process_creation
    product: windows
detection:
    selection_parent:
        ParentImage|endswith:
            - '\winword.exe'
            - '\excel.exe'
            - '\powerpnt.exe'
    selection_powershell:
        Image|endswith: '\powershell.exe'
        CommandLine|contains:
            - '-EncodedCommand'
            - '-NoProfile'
            - '-WindowStyle Hidden'
    selection_network_indicators:
        CommandLine|contains:
            - 'discord'
            - 'telegram'
            - 'workers.dev'
            - 'firebaseapp.com'
    condition: selection_parent and selection_powershell and selection_network_indicators
falsepositives:
    - Legitimate Office automation (rare with hidden window + encoded command combo)
level: critical
SIGMA — APT42-SIGMA-003: NICECURL VBScript Backdoor
title: APT42 - NICECURL VBScript Backdoor Execution
id: apt42-003-nicecurl-vbscript
status: stable
description: Detects NICECURL VBScript backdoor execution with curl.exe for C2 and WMI AV queries
references:
    - Volexity NICECURL analysis
    - Mandiant APT42 report
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.execution
    - attack.t1059.005
    - attack.command_and_control
    - attack.discovery
logsource:
    category: process_creation
    product: windows
detection:
    selection_vbs_curl:
        ParentImage|endswith:
            - '\wscript.exe'
            - '\cscript.exe'
        Image|endswith: '\curl.exe'
        CommandLine|contains: 'https://'
    selection_vbs_wmi:
        ParentImage|endswith:
            - '\wscript.exe'
            - '\cscript.exe'
        CommandLine|contains:
            - 'Win32_Product'
            - 'AntiVirusProduct'
    condition: selection_vbs_curl or selection_vbs_wmi
falsepositives:
    - Legitimate admin scripts (rare combo of VBScript parent + curl for HTTPS)
level: high
SIGMA — APT42-SIGMA-004: Cloud Mail Forwarding Rule Creation
title: APT42 - Suspicious Mail Forwarding Rule Creation
id: apt42-004-mail-forward-rule
status: stable
description: Detects creation of email forwarding rules to external addresses (common APT42 post-compromise persistence)
references:
    - Mandiant APT42 cloud TTP analysis
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.collection
    - attack.t1114.003
    - attack.exfiltration
logsource:
    product: azure
    service: auditlogs
detection:
    selection:
        Operation: 'New-InboxRule'
        ForwardTo|contains:
            - 'gmail.com'
            - 'yahoo.com'
            - 'outlook.com'
            - 'hotmail.com'
            - 'protonmail.com'
    condition: selection
falsepositives:
    - Legitimate user-configured forwarding (investigate with user to confirm)
level: high
SIGMA — APT42-SIGMA-005: Unauthorized MFA Method Registration
title: APT42 - Unauthorized MFA Method Addition
id: apt42-005-mfa-method-add
status: stable
description: Detects addition of new MFA authentication methods to high-value accounts (APT42 cloud persistence technique)
references:
    - Mandiant APT42 report
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.persistence
    - attack.t1098
    - attack.credential_access
logsource:
    product: azure
    service: auditlogs
detection:
    selection:
        Operation|contains:
            - 'Update user'
            - 'Add strong authentication method'
        ResultDescription|contains: 'Authenticator'
    filter_expected_locations:
        Location|contains:
            - 'US'
            - 'AE'
            - 'GB'
            # Adjust based on expected user geography
    condition: selection and not filter_expected_locations
falsepositives:
    - Legitimate user MFA enrollment from unexpected locations (travel)
    - Users using VPNs
level: medium
SIGMA — APT42-SIGMA-006: Suspicious Geographic Sign-In
title: APT42 - Iranian IP Range Authentication Attempt
id: apt42-006-iranian-geo-signin
status: stable
description: Detects authentication attempts from Iranian IP ranges or known Iranian VPN exit nodes
references:
    - APT42 infrastructure analysis
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.initial_access
    - attack.t1078
logsource:
    product: azure
    service: signinlogs
detection:
    selection_iran:
        Location: 'IR'
    selection_iranian_ip:
        IPAddress|startswith:
            - '2.176.'
            - '5.22.'
            - '31.7.'
            - '37.98.'
            - '46.224.'
            - '78.109.'
            - '79.175.'
            - '80.191.'
            - '85.185.'
            - '87.236.'
            # Extend with known Iranian ASN ranges
    condition: selection_iran or selection_iranian_ip
falsepositives:
    - Legitimate users traveling to Iran (rare for most organizations)
    - Iranian employees (filter by known user list)
level: high
SIGMA — APT42-SIGMA-007: Mass SharePoint/OneDrive Document Access
title: APT42 - Mass Cloud Document Exfiltration
id: apt42-007-mass-document-access
status: experimental
description: Detects unusual volume of SharePoint/OneDrive file access indicative of data exfiltration
references:
    - APT42 post-compromise cloud behavior
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.collection
    - attack.t1213.003
    - attack.exfiltration
logsource:
    product: azure
    service: auditlogs
detection:
    selection:
        Operation|contains:
            - 'FileAccessed'
            - 'FileDownloaded'
        Workload:
            - 'SharePoint'
            - 'OneDrive'
    timeframe: 1h
    condition: selection | count(ObjectId) by UserId > 100
falsepositives:
    - Legitimate bulk document operations (migrations, backups)
    - Power users syncing large document libraries
level: medium
SIGMA — APT42-SIGMA-008: Malicious Office Macro Execution
title: APT42 - Office Macro Spawning Suspicious Process
id: apt42-008-office-macro-suspicious
status: stable
description: Detects Office applications spawning suspicious child processes (common TAMECAT/NICECURL delivery)
references:
    - Mandiant APT42 report
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.execution
    - attack.t1204.002
    - attack.initial_access
logsource:
    category: process_creation
    product: windows
detection:
    selection_parent:
        ParentImage|endswith:
            - '\winword.exe'
            - '\excel.exe'
            - '\powerpnt.exe'
            - '\outlook.exe'
    selection_child:
        Image|endswith:
            - '\powershell.exe'
            - '\wscript.exe'
            - '\cscript.exe'
            - '\cmd.exe'
            - '\mshta.exe'
            - '\rundll32.exe'
            - '\regsvr32.exe'
    condition: selection_parent and selection_child
falsepositives:
    - Legitimate Office automation (add-ins, templates)
    - Administrative scripts launched from Outlook
level: high
SIGMA — APT42-SIGMA-009: LNK File Execution from Suspicious Path
title: APT42 - NICECURL LNK File Execution
id: apt42-009-lnk-suspicious-path
status: stable
description: Detects execution of .lnk files from temp/download folders (NICECURL delivery vector)
references:
    - Volexity NICECURL analysis
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.execution
    - attack.initial_access
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        CommandLine|contains:
            - '\AppData\Local\Temp'
            - '\Downloads\'
            - '\AppData\Roaming\Microsoft\Windows\Recent'
        CommandLine|endswith: '.lnk'
    selection_target:
        CommandLine|contains:
            - 'wscript.exe'
            - 'cscript.exe'
            - 'cmd.exe /c'
    condition: selection and selection_target
falsepositives:
    - Legitimate shortcuts executed from download folders (rare)
level: medium
SIGMA — APT42-SIGMA-010: AES Key String in PowerShell Memory
title: APT42 - TAMECAT AES Key Detection
id: apt42-010-tamecat-aes-key
status: experimental
description: Detects TAMECAT's hardcoded AES encryption key in PowerShell command lines or memory
references:
    - Mandiant APT42 report - TAMECAT analysis
author: HawkEye Threat Intelligence
date: 2026/03/12
tags:
    - attack.command_and_control
    - attack.t1573.001
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        Image|endswith: '\powershell.exe'
        CommandLine|contains: 'kNz0CXiP0wEQnhZXYbvraigXvRVYHk1B'
    condition: selection
falsepositives:
    - None expected (highly specific to TAMECAT malware)
level: critical
🛡️

Defensive Recommendations

⚠️ Defense Paradigm Shift Required

APT42 defeats traditional perimeter and endpoint security. The attack surface is individual humans and their personal cloud accounts — often accessed from personal devices outside corporate control. Defenses must focus on identity security, security awareness for high-value personnel, and cloud environment hardening. Technical controls alone provide minimal protection against patient, multi-week social engineering campaigns targeting specific individuals.

🔐
Identity Security

  • Deploy phishing-resistant MFA for all high-value personnel — FIDO2/WebAuthn hardware keys (YubiKey, Titan Key). APT42's credential harvesting kits can bypass TOTP and SMS-based MFA. Only FIDO2 provides reliable protection
  • Enforce conditional access policies — Require compliant devices + trusted locations + phishing-resistant MFA for cloud access. Block legacy authentication protocols entirely
  • Implement anomaly-based authentication monitoring — Alert on: (1) Geographic anomalies (Iran, unexpected VPN exits), (2) New MFA method registrations, (3) Mail forwarding rule creation, (4) Mass document access, (5) Sign-ins from Tor/VPN/anonymizing services
  • Restrict MFA method self-service registration — High-value accounts should require admin approval for new MFA method additions. APT42 uses stolen credentials to register unauthorized Authenticator methods for persistent access
  • Periodic credential reset for high-risk personnel — Government officials, journalists, researchers, NGO staff in contact with Iranian subjects should rotate passwords quarterly and verify no unauthorized MFA methods exist
  • Implement cloud session security — Set aggressive session timeout policies (8-12 hours max). Require re-authentication for sensitive operations (admin actions, bulk document download)

👤
Personnel Security Awareness

  • Target-specific awareness briefings — Journalists, academics, government officials, NGO personnel, and Iranian diaspora members face elevated APT42 risk. Provide tailored briefings on APT42 TTPs specific to their professional context
  • Teach social engineering lifecycle recognition — APT42 campaigns unfold over weeks. Key indicators: (1) Unsolicited professional outreach from journalists/academics, (2) Multiple benign emails before any link/attachment, (3) Requests to open documents "relevant to your work," (4) Conference invitations with login portals, (5) Follow-up via WhatsApp/Telegram after email contact
  • Verify sender identity via out-of-band channels — If contacted by a journalist or researcher, verify their identity by calling the publication/organization directly (not using contact info from the email). Check LinkedIn profile creation date and connection network
  • Never open unexpected documents from new contacts — Even if the content seems relevant to your work. Request PDF versions instead of Word/Excel. Open in sandboxed/disposable environments if absolutely necessary
  • Be skeptical of urgency and flattery — APT42 operators use professional flattery ("we admire your work on X") and artificial urgency ("conference deadline tomorrow") to bypass skepticism
  • Personal device security for high-value individuals — Recognize that APT42 targets personal Gmail, personal phones, personal social media — not just work accounts. High-value individuals should use separate devices for sensitive professional work
  • Family member awareness — SpearSpecter explicitly targeted family members. High-risk individuals should brief immediate family on APT42 tactics (unexpected friend requests, interview requests, suspicious messages)

🛡️
Technical Controls

  • Deploy Sigma detection rules — Implement all 10 APT42 Sigma rules. Prioritize APT42-SIGMA-002 (TAMECAT PowerShell from Office), APT42-SIGMA-004 (mail forwarding rules), APT42-SIGMA-006 (Iranian geo sign-in)
  • Macro hardening — Block macros in documents from the internet entirely via Group Policy. For users who absolutely require macros, implement VBA macro signing and allowlist-only execution
  • PowerShell logging and constraint — Enable PowerShell Script Block Logging and Transcription. Deploy PowerShell Constrained Language Mode for standard users. Alert on PowerShell execution from Office applications
  • Block typosquatted domains via DNS — Deploy DNS filtering (Cloudflare Gateway, Cisco Umbrella, etc.) to block known APT42 credential harvesting domains. Update blocklists weekly based on threat intelligence feeds
  • Email link protection — Implement URL rewriting/sandboxing (Microsoft Defender for Office 365 Safe Links, Proofpoint URL Defense). Detonate suspicious links in isolated environments before user access
  • Endpoint detection for NICECURL patterns — Alert on VBScript execution spawning curl.exe with HTTPS connections, or VBScript querying WMI for antivirus products
  • Network monitoring for C2 patterns — Monitor for outbound HTTPS to Discord, Telegram, Cloudflare Workers, Firebase from non-browser processes (especially PowerShell, wscript.exe)

☁️
Cloud Environment Hardening

  • Audit and alert on mail forwarding rules — Implement automated detection for new forwarding rules to external addresses (Gmail, Yahoo, Outlook.com). Require admin approval for forwarding rule creation by high-value accounts
  • Monitor for mass document access — Alert when users access >50 SharePoint/OneDrive files within 1 hour, especially outside normal working hours or from new locations
  • Implement privileged identity management — Use Azure AD Privileged Identity Management (PIM) for just-in-time admin access. Require approval workflows and time-limited elevation
  • Restrict OAuth app permissions — APT42 may abuse OAuth tokens for persistent access. Implement OAuth app consent policies requiring admin approval. Audit existing OAuth grants for suspicious applications
  • Cloud access security broker (CASB) deployment — Deploy CASB solution to monitor cloud application usage, detect anomalous data exfiltration, and enforce data loss prevention policies
  • Implement Microsoft Defender for Cloud Apps — Enable impossible travel alerts, suspicious inbox manipulation detection, and anomalous file share access detection
  • Restrict cloud admin operations to managed devices — Azure AD admin roles should only be accessible from corporate-managed, compliant devices — never from personal BYOD devices
🇦🇪 GCC-Specific Guidance

APT42's documented use of Khaleej Times impersonation and active targeting of Gulf defense officials confirms operational interest in the UAE and broader GCC region. Organizations should:

  • Brief personnel on APT42's use of regional media outlets as impersonation infrastructure
  • Verify unsolicited contact from journalists via direct calls to publication offices
  • Government and defense sector personnel should assume elevated risk following Operation Epic Fury (Feb 2026)
  • Consider implementing enhanced monitoring for key decision-makers involved in Abraham Accords, US base hosting, or regional security cooperation
📊

Threat Landscape Visualization

Attack Techniques by Frequency

Campaign Timeline: APT42 Operations 2015-2026

📚

References & Intelligence Sources

Primary Threat Intelligence Reports

  1. Mandiant (Google Cloud) — "APT42: Crooked Charms, Cons and Compromise" (Comprehensive report, May 2024)
  2. Google Threat Analysis Group (TAG) — "Iranian Group APT42 Targeting US Election Campaigns" (August 2024)
  3. Israel National Digital Agency (INDA) — "SpearSpecter Campaign Analysis" (November 2025)
  4. Proofpoint — "TA453 Operations Against Think Tanks and Policy Experts" (2023–2024)
  5. Volexity — "NICECURL and GhostEcho: Iranian APT42 Deploys New Malware" (September 2023)
  6. Microsoft Threat Intelligence — "Mint Sandstorm (Phosphorus) Activity Reports" (2021–2026)
  7. CrowdStrike — "Educated Manticore Targeting Israeli Cybersecurity Professionals" (June 2025, post-12-Day War)
  8. Check Point Research — "APT42/Educated Manticore Targeting Regional Security Professionals" (March 2026)
  9. PwC Threat Intelligence — "Yellow Garuda Operations Analysis" (2023)
  10. Secureworks — "COBALT ILLUSION: Iranian Espionage Operations" (2022–2024)

MITRE ATT&CK & Industry Standards

  1. MITRE ATT&CK — Group G1044 (APT42) — https://attack.mitre.org/groups/G1044/
  2. MITRE D3FEND — Defensive techniques mapped to APT42 TTPs

Campaign-Specific Reporting

  1. UNK_SmudgedSerpent Campaign — Targeting US academics and Iran policy experts (June–August 2025)
  2. Operation Newscaster — Retrospective APT42 attribution for 2012–2014 social media espionage
  3. Operation Parastoo — Retrospective APT42 attribution for IAEA server breach (2012)
  4. HBO Cyberattack — Joint investigation linking attack to Charming Kitten/APT42 cluster (2017)

Geopolitical & Strategic Context

  1. CSIS — "Iran Cyber Escalation Assessment Post-Operation Epic Fury" (March 2026)
  2. US Department of Justice — Indictments of Iranian nationals linked to APT42 operations (various dates)
  3. FBI/CISA/ODNI — Joint advisories on Iranian election interference operations (2020, 2024)
  4. Abraham Accords Security Implications — Analysis of Iranian cyber operations against Gulf states post-normalization

GCC-Specific Intelligence

  1. Khaleej Times Impersonation Infrastructure — Documented in Mandiant APT42 report (2024)
  2. SpearSpecter Gulf Targeting — INDA report on Gulf defense official targeting (September 2025)
  3. UAE Media Outlet Spoofing Patterns — APT42 impersonation of regional outlets for credential harvesting