Techniques, tactics and practices:
Charming Kitten is a highly sophisticated Advanced Persistent Threat (APT) that has been active since at least 2011. It is believed to be operated by the Russian government and has targeted various organizations, including political parties, military contractors, media outlets, and human rights groups.
Charming Kitten uses a variety of techniques, tactics, and practices in order to achieve its objectives:
* Spear-phishing emails are used as the primary method for delivering malware to targeted organizations. These emails often contain links or attachments that appear legitimate but actually lead to infected websites or documents.
* Once a system is compromised, Charming Kitten uses various tools and techniques in order to maintain access and steal sensitive information:
+ Keyloggers are used to capture login credentials for email accounts, social media platforms, and other online services.
+
Alternative Names
Parastoo, iKittens, NEWSCASTER, NewsBeef, Phosphorus / Mint Sandstorm, TA453, COBALT MIRAGE, Ballistic Bobcat, APT35, Group 83, G0059,