Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

Related

CISOs and Security Leaders to Watch in Australian Media and Entertainment

Cybersecurity in media and entertainment has quietly become one...

Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

What happened A security vulnerability in the Moltbook AI agent...

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing Data

What happened Socket researchers uncovered multiple malicious Chrome extensions that...

NationStates Confirms Data Breach and Temporarily Shuts Down Game Site

What happened NationStates confirmed a data breach after unauthorized remote...

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

What happened A cyber espionage campaign attributed to an Iran-linked...

Share

What happened

A cyber espionage campaign attributed to an Iran-linked threat actor known as RedKitten was observed targeting NGOs and human rights activists. The campaign used malicious Excel files with embedded VBA macros themed around protest-related content to lure victims into enabling execution. Once activated, the documents deployed a backdoor called SloppyMIO, which relied on cloud services such as GitHub and Google Drive for configuration and used Telegram for command-and-control communications.

Who is affected

Human rights organizations and individuals who opened the malicious Excel files were affected through installation of backdoor malware.

Why CISOs should care

The activity demonstrates continued use of social engineering and cloud-based infrastructure by state-aligned actors.

3 practical actions

  • Scan for malicious macro usage. Detect suspicious Excel macro execution.
  • Monitor cloud storage access. Identify misuse of GitHub or Google Drive for payload delivery.
  • Inspect Telegram traffic. Look for command-and-control indicators.