BASICSTAR: Charming Kitten’s Latest Cyberweapon

by | Feb 19, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A cyber threat group originating from Iran, known as Charming Kitten, has resurfaced with a fresh wave of attacks targeting experts in Middle East policy using a newly identified backdoor named BASICSTAR. This latest campaign involves the creation of a deceptive webinar portal to lure unsuspecting victims into their trap.

New BASICSTAR Backdoor

The Tactics of Charming Kitten

Charming Kitten, also recognized by aliases such as APT35, CharmingCypress, Mint Sandstorm, TA453, and Yellow Garuda, has a well-documented history of executing sophisticated social engineering schemes. Their targets often include think tanks, non-governmental organizations (NGOs), and journalists, indicating a strategic focus on entities involved in geopolitical affairs.

According to researchers at Volexity, Charming Kitten’s modus operandi includes engaging targets in prolonged email conversations before directing them to malicious content. This tactic serves to establish trust before launching the attack.

Recent findings from Microsoft highlight that high-profile individuals engaged in Middle Eastern affairs have been specifically targeted by Charming Kitten. The group employs malware such as MischiefTut and MediaPl (also known as EYEGLASS) to infiltrate systems and extract sensitive information.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Attributed to Iran’s Islamic Revolutionary Guard Corps (IRGC), Charming Kitten has deployed various backdoors, including PowerLess, BellaCiao, POWERSTAR (also known as GorjolEcho), and NokNok, demonstrating their persistent efforts to refine their tactics and evade detection.

The phishing campaigns observed between September and October 2023 involved Charming Kitten posing as the Rasanah International Institute for Iranian Studies (IIIS) to establish credibility with their targets. They utilize compromised email accounts and a technique called Multi-Persona Impersonation (MPI) to enhance the authenticity of their communications.

New BASICSTAR Backdoor

These attacks typically initiate with RAR archives containing LNK files, leading to the deployment of malware. One notable infection sequence involves BASICSTAR and KORKULOADER, a PowerShell downloader script, showcasing the group’s technical sophistication.

BASICSTAR, a Visual Basic Script (VBS) malware, possesses capabilities for gathering system information, executing remote commands, and displaying decoy PDF files. Moreover, Charming Kitten tailors its attacks based on the target’s operating system, utilizing different backdoors for Windows and macOS systems.




Recorded Future’s recent disclosure unveils IRGC’s broader targeting strategy, extending to Western countries through a network of contracting companies. These entities, suspected to be closely associated with the IRGC, facilitate the export of surveillance and offensive technologies to regions like Iraq, Syria, and Lebanon.

The intricate relationship between Iran-based contractors and intelligence organizations involves cyber centers acting as conduits to conceal the true origins of these operations. Notable entities in this network include Ayandeh Sazan Sepher Aria, DSP Research Institute, Sabrin Kish, Soroush Saman, Mahak Rayan Afraz, and the Parnian Telecommunication and Electronic Company.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: thehackernews.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This