Charming Kitten and Medical Researchers - A Cat and Mouse Game

Charming Kitten and Medical Researchers - A Cat and Mouse Game

Have you heard of BadBlood? No, not the song. It is this spearphishing campaign whose purpose was to steal credentials from medical professionals. The campaign has finally been linked to the Charming Kitten APT.

What’s going on?


This late-2020 spearphishing campaign aimed to steal the credentials of 25 senior medical researchers in oncology, neurology, and genetic research in the U.S. and Israel. Charming Kitten or TA453 usually targets academics, dissidents, journalists, and diplomats. Hence, the targeting of senior researchers is a departure from the group’s usual activity.

Why does it matter?


The trend of targeting medical researchers has clearly been escalating due to various reasons, one of them being COVID-19 vaccine research. BadBlood is just another addition to that wagon. Although the motives for the attacks have not been clearly demarcated by researchers, the conjecture is that it is an ad hoc incident to gather intelligence that can be used in future phishing campaigns.

About Charming Kitten


This is an Iranian-sponsored APT group and has been around since at least 2014.
It is mainly known for cyberespionage and boasts of an arsenal containing 240 malicious domains, at least 85 IP addresses, and hundreds of fake identities.
It was last visible in November 2020 when it launched spoofing attacks against attendees of the Munich Security Conference and Think 20 Summit in Saudi Arabia.
The group was also associated with targeting former President Trump’s reelection campaign.

The bottom line


BadBlood is not one of its ki ..

Support the originator by clicking the read the rest link below.