Tuesday, May 6, 2025
HomeCyber AttackImperial Kitten Attacking Tech Firms with SQLi & Scanning Tools

Imperial Kitten Attacking Tech Firms with SQLi & Scanning Tools

Published on

SIEM as a Service

Follow Us on Google News

Researchers detected IMPERIAL KITTEN, an adversary with ties to Iran, conducting strategic web compromise (SWC) operations with a focus on transportation, logistics, and technology firms.

The adversary, who has been operating since at least 2017, has been reported to have ties to the Islamic Revolutionary Guard Corps (IRGC) and fulfill Iran’s needs for strategic intelligence related to IRGC activities.

Its operation is distinguished by the use of social engineering, namely job recruitment-themed content, to distribute custom .NET-based implants.

- Advertisement - Google News

Previously, IMPERIAL KITTEN has targeted the energy, maritime, defense, technology, consulting, and professional services sectors.

Tactics, Techniques, and Procedures Employed

CrowdStrike claims that IMPERIAL KITTEN intrusion chains employ the following tactics, techniques, and procedures:

  • Using one-day exploits, public scanning tools, SQL injection, and compromised VPN credentials to gain initial access.
  • Use of scanning tools, PAExec, and credential theft.
  • Data exfiltration by leveraging custom and open-source malware to target Middle Eastern entities.

“In a SWC, the adversary attempts to compromise victims based on their shared interest by luring them to an adversary-controlled website”, CrowdStrike said in a report shared with Cyber Security News.

As of now, compromised (mostly Israeli) websites can be redirected to the adversary-controlled domains, which are also the locations where data gathered to create visitor profiles is sent.

According to the researchers, SWC domains employed the Matomo analytics service1 in early 2022 to profile visitors who visited the hijacked Israeli websites. 

Later, SWC domain iterations employ a custom script to profile visitors by collecting browser information and IP addresses, which are then delivered to a hardcoded domain.

According to CrowdStrike intelligence Collection reporting, the final payload of the SWC activities is a malware family known as IMAPLoader.

Document
Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

Reports mention that the adversary may occasionally serve malware to SWC victims directly. There is some evidence that IMPERIAL KITTEN targets companies, such as upstream IT service providers, in order to locate and obtain access to targets that are of major interest for data exfiltration.

Additionally, malicious Microsoft Excel documents are allegedly used in IMPERIAL KITTEN’s phishing operations.

“IMPERIAL KITTEN achieves lateral movement through the use of PAExec (the open-source PsExec alternative) and NetScan, and uses ProcDump to dump the LSASS process memory for credential harvesting”, researchers said.

It is possible that IMPERIAL KITTEN uses open-source tools like MeshAgent3 or deploys custom malware to exfiltrate data.

It is stated that IMPERIAL KITTEN operations use a variety of tools, such as custom implants, a remote access tool (RAT) that uses Discord for C2, IMAPLoader, and StandardKeyboard, which both use email for C2.  

Notably, in May 2023, a sophisticated watering hole attack was detected by ClearSky and connected to Imperial Kitten. The attack was also aimed at multiple Israeli websites.

Targeting Israeli transportation, maritime, and technology groups is consistent with Imperial Kitten’s prior actions in this instance as well.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

TikTok Hit with €530 Million Fine Over Data Transfers to China

Irish Data Protection Commission (DPC) has imposed a landmark €530 million fine on TikTok...

xAI API Key Leak Exposes Proprietary Language Models on GitHub

Employee at Elon Musk’s artificial intelligence firm xAI inadvertently exposed a private API key...

Firefox’s Future Uncertain Without Google Search Deal, Insider Warns

Mozilla's Chief Financial Officer testified that Firefox could face extinction if Justice Department proposals...

Google Gemini Introduces Built-In Image Editing in App

Google has integrated advanced AI-powered image editing tools directly into its Gemini app, enabling...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TikTok Hit with €530 Million Fine Over Data Transfers to China

Irish Data Protection Commission (DPC) has imposed a landmark €530 million fine on TikTok...

xAI API Key Leak Exposes Proprietary Language Models on GitHub

Employee at Elon Musk’s artificial intelligence firm xAI inadvertently exposed a private API key...

Firefox’s Future Uncertain Without Google Search Deal, Insider Warns

Mozilla's Chief Financial Officer testified that Firefox could face extinction if Justice Department proposals...