CopyKittens is an Iranian cyber espionage group that has been operating since at least 2013. It has targeted countries including Israel, Saudi Arabia, Turkey, the U.S., Jordan, and Germany. The group is responsible for the campaign known as Operation Wilted Tulip.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | 代理 |
CopyKittens has used the AirVPN service for operational activity.[4] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
CopyKittens has used PowerShell Empire.[2] |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
CopyKittens uses ZPP, a .NET console program, to compress files with ZIP.[2] |
| .003 | 归档收集数据: Archive via Custom Method |
CopyKittens encrypts data with a substitute cipher prior to exfiltration.[3] |
||
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
CopyKittens uses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.[2] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
CopyKittens has used Metasploit, Empire, and AirVPN for post-exploitation activities.[5][4] |
| Enterprise | T1564 | .003 | 隐藏伪装: Hidden Window |
CopyKittens has used |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
CopyKittens digitally signed an executable with a stolen certificate from legitimate company AI Squared.[2] |