Thursday, February 27, 2025
HomeCyber AttackImperial Kitten Attacking Tech Firms with SQLi & Scanning Tools

Imperial Kitten Attacking Tech Firms with SQLi & Scanning Tools

Published on

SIEM as a Service

Follow Us on Google News

Researchers detected IMPERIAL KITTEN, an adversary with ties to Iran, conducting strategic web compromise (SWC) operations with a focus on transportation, logistics, and technology firms.

The adversary, who has been operating since at least 2017, has been reported to have ties to the Islamic Revolutionary Guard Corps (IRGC) and fulfill Iran’s needs for strategic intelligence related to IRGC activities.

Its operation is distinguished by the use of social engineering, namely job recruitment-themed content, to distribute custom .NET-based implants.

Previously, IMPERIAL KITTEN has targeted the energy, maritime, defense, technology, consulting, and professional services sectors.

Tactics, Techniques, and Procedures Employed

CrowdStrike claims that IMPERIAL KITTEN intrusion chains employ the following tactics, techniques, and procedures:

  • Using one-day exploits, public scanning tools, SQL injection, and compromised VPN credentials to gain initial access.
  • Use of scanning tools, PAExec, and credential theft.
  • Data exfiltration by leveraging custom and open-source malware to target Middle Eastern entities.

“In a SWC, the adversary attempts to compromise victims based on their shared interest by luring them to an adversary-controlled website”, CrowdStrike said in a report shared with Cyber Security News.

As of now, compromised (mostly Israeli) websites can be redirected to the adversary-controlled domains, which are also the locations where data gathered to create visitor profiles is sent.

According to the researchers, SWC domains employed the Matomo analytics service1 in early 2022 to profile visitors who visited the hijacked Israeli websites. 

Later, SWC domain iterations employ a custom script to profile visitors by collecting browser information and IP addresses, which are then delivered to a hardcoded domain.

According to CrowdStrike intelligence Collection reporting, the final payload of the SWC activities is a malware family known as IMAPLoader.

Document
Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

Reports mention that the adversary may occasionally serve malware to SWC victims directly. There is some evidence that IMPERIAL KITTEN targets companies, such as upstream IT service providers, in order to locate and obtain access to targets that are of major interest for data exfiltration.

Additionally, malicious Microsoft Excel documents are allegedly used in IMPERIAL KITTEN’s phishing operations.

“IMPERIAL KITTEN achieves lateral movement through the use of PAExec (the open-source PsExec alternative) and NetScan, and uses ProcDump to dump the LSASS process memory for credential harvesting”, researchers said.

It is possible that IMPERIAL KITTEN uses open-source tools like MeshAgent3 or deploys custom malware to exfiltrate data.

It is stated that IMPERIAL KITTEN operations use a variety of tools, such as custom implants, a remote access tool (RAT) that uses Discord for C2, IMAPLoader, and StandardKeyboard, which both use email for C2.  

Notably, in May 2023, a sophisticated watering hole attack was detected by ClearSky and connected to Imperial Kitten. The attack was also aimed at multiple Israeli websites.

Targeting Israeli transportation, maritime, and technology groups is consistent with Imperial Kitten’s prior actions in this instance as well.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...