“Rampant Kitten”, an Iranian Surveillance Operation Coming to Light

Last updated June 28, 2021
Written by:
Bill Toulas
Bill Toulas
Cybersecurity Journalist

Check Point Research has discovered a massive espionage operation set up by Iranian entities, and which targets mainly expats and dissidents. The tools that are deployed in the still ongoing operation are highly sophisticated, including an Android backdoor that can extract two-factor authentication codes from SMS messages, Telegram phishing pages, and four variants for Windows info-stealers that steal both documents and account credentials.

The confirmed targets of the campaign include the Balochistan people, the Azerbaijan National Resistance Organization, and the Association of Families of Camp Ashraf and Liberty Residents (AFALR).

infection process

Source: Check Point

The initial compromise of the victims happens through laced documents that carry a malicious payload. The malware is actually an info-stealer that focuses a lot on Telegram because most of the aforementioned activists trust and use Telegram for their communications. So, the payload checks if Telegram is installed on the machine, and if it is, it injects a modified updater.

From there, the malware can steal Telegram accounts, information from the KeePass (password manager), log clipboard data, take screenshots from the desktop, and even download and install additional modules. The malware stays persistent even if the user updates their Telegram installation, so this is no way to unroot it.

fake app

Source: Check Point

The Android backdoor masquerades as a service for Persian speakers in Sweden, so it targets expats there. Its capabilities include the stealing of SMS messages, 2FA code exfiltration, contact list retrieval, voice recording, microphone activation, Google account phishing, tampering with running processes, and more. Again, Telegram is actively targeted, and victims are regularly pointed to phishing pages that are themed accordingly.

telegram phishing page

Source: Check Point

We know who the targets are, and we can assume who could be behind the "Rampant Kitten" operation, but Check Point couldn't make any definitive attributions. The traces that were left from the threat group or entity point to domains that were registered by spoofed or fake identities, while one of the email addresses were used to register on Iranian hacking forums too.

The focus on Telegram and KeePass denotes that the hackers' goal is to collect information, so there seem to be no financial motives involved. The Iranian government has tried to ban the use of Telegram in the past, and when COVID-19 hit the country, they spawned apps that were basically spyware, contracting a developer known for putting shady Telegram forks out there. Still, we can't attribute "Rampant Kitten" to the Iranian state, but the pieces definitely fit.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: