Threat Actor Characterization
Ferocious Kitten
ID: d6a82c66fa050b068fbfbbe2ec32eb7356544| FerociousKitten | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Ferocious Kitten (G0137) is an Iran-focused espionage actor active since at least 2015 that deploys MarkiRAT via weaponized documents and application-hijacking to collect keystrokes, clipboard and files from Persian-speaking targets.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1204 | User Execution | TA0002 |
|
| T1056 | Input Capture | TA0006 TA0009 |
|
| T1543 | Create or Modify System Process | TA0003 TA0004 |
|
CLASSIFICATION: Unclassified / Open Source
Executive Summary
Ferocious Kitten (MITRE Group G0137) is a threat actor active since at least 2015 that has conducted covert cyber-espionage against Persian-speaking individuals in Iran. The group deploys a custom Windows RAT (named MarkiRAT), uses weaponized document attachments and tailored decoys, and has variants that hijack popular local applications (Telegram, Chrome) and target Android as well as Windows platforms. Kaspersky’s forensic analysis (published 2021) documents MarkiRAT functionality (keylogging, clipboard capture, file upload/download, remote command execution), persistence techniques, and long-running reuse of infrastructure and domains such as updatei[.]com. Public reporting and press coverage corroborate the Iran-focused victimology and long dwell time. Overall confidence: high for core facts (actor identity, primary tooling, victimology).
- Industries / Sectors: Primarily individuals and civil society actors (Persian-speaking users) — activists, journalists, and users of local Iranian services; targeting is person-centric rather than broad corporate targeting.
- Geography (Region): Middle East / Iran-centric operations.
- Countries (if available): Iran (primary observed victims).
- Timeframe: 2015 – present (observed through 2021 reporting; actor page maintained by MITRE 2021 → 2025).