Charming Kitten Wreaks Havoc with PowerShell Backdoor

  • By David Lukic
  • Published: Feb 08, 2022
  • Last Updated: Feb 27, 2025

 The infamous Iranian advanced persistent threat, commonly referred to with the acronym APT, is creating significant digital security problems with its Charming Kitten attacks. Charming Kitten’s latest tools include PowerShell backdoor and a litany of clandestine tactics. In short, Charming Kitten is rapidly evolving, and the cyber security industry is struggling to keep pace. The digital security specialists who keep their fingers on the pulse of the industry believe Charming Kitten’s new tools indicate the group might be responsible for Memento ransomware.

How is Charming Kitten Evolving?

Digital security specialists with Cybereason, a cyber security company, recently highlighted Charming Kitten’s cyber-attack tools. Cybereason’s team identified a backdoor referred to as PowerLess Backdoor along with a highly specialized maneuver that facilitates the use of a .NET backdoor as opposed to one that catalyzes PowerShell activation.  
 
The Cybereason crew published its findings this past Tuesday. The toolset in question includes everything from a tool that steals browser information to malware loaders, keyloggers, and novel backdoors.

What Else is Known About Charming Kitten?

Charming Kitten is feared as it attacks at a comparably high frequency. Furthermore, Charming Kitten has the backing of the Iranian government. 
Also known as Phosphorous, Ajax Security Team, Newscaster, NewsBeef, and APT35, Charming Kitten debuted in 2018. The group targets think tanks, researchers, political activists, academicians, journalists, and politicians. 
 
The hacking collective is also problematic as it has targeted high-profile public figures, including current President Joe Biden and former President Donald Trump. To be more specific, the hackers disrupted both politicians’ campaigns.

What has Charming Kitten Been up to Lately?

Cybereason’s Nocturnus crew discovered a new variation of Charming Kitten activity when studying digital threats, including an alternating IP address tied to Iranian cyber attackers. The analysis revealed that the Iranian hackers are using several novel tools, including those characteristic of Memento ransomware.
 
Charming Kitten employs a PowerLess Backdoor, meaning a PowerShell trojan that has not been fully documented. This trojan supports the download of additional payloads, including information stealing tactics and keyloggers. Cybereason also pinpointed a novel execution of PowerShell in which the backdoor is concealed from products used to detect security threats. This PowerShell code operates within the .NET application, making it difficult to identify and thwart.  
 
It is also worth noting Cybereason has characterized the Iranian hacking collective’s attempts as open-source that use cryptography libraries to target payloads and encrypted communication. The use of such open-source tools indicates the hackers behind these unique attacks are skilled at intermediate-level coding yet have not gone to the extent of mastering the nuances of specific coding languages.

Is Charming Kitten Responsible for Memento Ransomware?

Cybereason’s digital security specialists indicate Charming Kitten likely has ties to Memento ransomware that struck targets toward the end of 2021. Though Memento ransomware was not attributed until recently, the links indicate the Iranian APT might be pivoting away from its conventional cyber-attack techniques toward new cybercrimes. Charming Kitten recently exploited an RCE weakness dubbed “ProxyShell vulnerability” within Microsoft’s Exchange servers at the same time that Memento was unleashed.
 
According to Cybereason, Charming Kitten has used harmful files and idiosyncratic URL directories that indicate the group is likely connected to Memento ransomware attacks. In particular, there are character strings created by the script used within Memento ransomware attacks. Analysis of the directory’s activity reveals the IP is a domain that functions as a memento command and control mechanism.  
 
 

About the Author
IDStrong Logo

Related Articles

46,000 Veterans and 13 Community Care Providers Affected by a VA Data Breach

The Incident Early last week, the Department of Veteran Affairs (VA) was breached by an unknown c ... Read More

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Latest Articles

What You Need to Know about the DaVita Data Breach

What You Need to Know about the DaVita Data Breach

DaVita is a healthcare provider based in Denver, Colorado, specializing in kidney dialysis. Founded in 2000, the company's name is based on an Italian phrase that translates to 'Giving Life'.

What You Need to Know about the Tea App Data Breach

What You Need to Know about the Tea App Data Breach

Sean Cook created the tea app in November 2022. As a former product manager at Salesforce and Shutterfly, Sean self-funded the project, inspired by his mother's negative experiences in the dating pool.

What You Need to Know about the Allianz Life Data Breach

What You Need to Know about the Allianz Life Data Breach

Allianz Life Insurance Company of North America is a large financial and retirement solutions provider. It specializes in investment items, annuities, and life insurance.

What You Need to Know about the Radiology Associates of Richmond Data Breach

What You Need to Know about the Radiology Associates of Richmond Data Breach

Founded by Dr. Daniel Talley in 1905, the Radiology Associates of Richmond is one of America's oldest private radiology practices.

What you need to know about the Esse Health Data Breach

What you need to know about the Esse Health Data Breach

Established in 1996, Esse Health was the product of a merger of two physician-led institutions. It soon emerged as a leading independent physician group in the larger St. Louis area, operating in more than 50 locations.

What You Need to Know about the Episource Data Breach

What You Need to Know about the Episource Data Breach

Episource is a California-based healthcare services and technology company that provides risk adjustment and medical coding services to healthcare plans, doctors, and several other types of healthcare organizations.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close