INTELLIGENCE REPORT — APT35

TLP:CLEAR | CTI Team | Updated: March 2026

1. IDENTIFICATION & ATTRIBUTION

Denominations (known aliases by vendor)

The group is tracked under the following denominations: APT35 (Mandiant/Google TI, reference designation), Phosphorus / Mint Sandstorm (Microsoft), TA453 (Proofpoint), Charming Kitten (ClearSky), Ballistic Bobcat (ESET), ITG18 (IBM X-Force), Yellow Garuda (PwC), NewsBeef (Kaspersky). Additional documented aliases: Ajax Security Team, Cobalt Illusion, Calanque, G0059 (MITRE ATT&CK).

Origin

Iran.

Presumed sponsor

The group is assessed as operating on behalf of the IRGC — Islamic Revolutionary Guard Corps, Intelligence Organization (IRGC-IO) (1). Attribution rests on convergence across multiple vendors (Mandiant, Microsoft, CrowdStrike, Proofpoint, ClearSky) and technical artifacts consistent with documented IRGC-IO operational patterns.

Sophistication level

Tier 2 — High. APT35 develops its tooling in-house, conducts highly elaborate spear-phishing operations with convincing identity impersonation, and has maintained a documented mobile capability on iOS and Android since 2023. The arsenal has significantly diversified between 2021 and 2025 with the introduction of NokNok (macOS), TAMECAT, and LIONTAIL.

Motivation

Strategic espionage — intelligence collection for geopolitical purposes. Documented interest in nuclear, defense, and foreign policy dossiers, as well as Iranian dissidents in exile.

Status

ACTIVE — last documented activity: 2025, TAMECAT/POWERSTAR campaigns (2).

Targeted sectors

  • Government, diplomacy, defense
  • Think tanks, academic and research organizations
  • Journalists, activists, Iranian dissidents in exile
  • Nuclear and energy sectors
  • NGOs, international media
  • Pharmaceutical industry and healthcare (documented since 2020)

Targeted geographies

  • United States, Israel, United Kingdom, Western Europe
  • Middle East (Saudi Arabia, UAE, Iranian domestic targets)
  • India, Pakistan
  • Iranian diaspora worldwide

2. INFRASTRUCTURE & TTPs

C2 Infrastructure

APT35 favors legitimate cloud providers (AWS, Cloudflare, Microsoft Azure) to blend C2 traffic. Recurring registrars include Namecheap and IONOS, with systematic WHOIS anonymization. Domains follow typosquatting patterns impersonating well-known media and institutions, with subdomains structured as mail.[domain], secure.[domain], login.[domain]. Infrastructure is frequently recycled across campaigns with rapid IOC rotation. Protocols include HTTPS, DNS over HTTPS, WebSocket, and hijacked legitimate messaging services (Telegram, WhatsApp).

MITRE ATT&CK TTPs

PhaseTechniqueATT&CK IDAssociated procedure
Initial AccessSpear-phishing LinkT1566.002Fake OneDrive, Google Drive, Outlook links
Initial AccessSpear-phishing AttachmentT1566.001Malicious Office documents, weaponized PDFs
Initial AccessValid Accounts — Web ServicesT1078.004Credential harvesting via fake portals
ExecutionPowerShellT1059.001POWERSTAR, TAMECAT
ExecutionUser Execution: Malicious LinkT1204.001Themed lures — conference invitations, job offers
PersistenceScheduled Task/JobT1053.005POWERSTAR, BellaCiao
PersistenceRegistry Run KeysT1547.001GORBLE, LIONTAIL
Defense EvasionMasqueradingT1036Impersonation of journalists, researchers
Defense EvasionObfuscated FilesT1027Base64-encoded PowerShell scripts
Credential AccessCredential HarvestingT1056.003HYPERSCRAPE, fake Outlook/Gmail portals
CollectionEmail CollectionT1114HYPERSCRAPE — mailbox exfiltration
CollectionScreen CaptureT1113POWERSTAR, CharmPower
C2Application Layer Protocol: WebT1071.001HTTPS to cloud infrastructure
C2Encrypted ChannelT1573TLS, encrypted communications
ExfiltrationExfiltration Over C2 ChannelT1041POWERSTAR, LIONTAIL

3. MALWARE & TOOLING

POWERSTAR

  • Type: PowerShell backdoor
  • Function: Remote access, command execution, screen capture, file theft, persistence
  • C2 channel / technical specifics: HTTPS to cloud infrastructure; variants using Dropbox and Google Drive as intermediate storage; dead drop resolver via legitimate services; encrypted communications (3)
  • First identified: SpoofedScholars campaign 2021 — multiple evolving variants documented through 2025
  • Status: Active

HYPERSCRAPE

  • Type: Email data harvester
  • Function: Automated exfiltration of Google, Yahoo, and Microsoft mailbox content from an authenticated victim account
  • C2 channel / technical specifics: Standalone tool; bypasses 2FA by reusing stolen active sessions; deletes security notifications sent by providers (4)
  • First identified: Google TAG — July 2022
  • Status: Active

TAMECAT

  • Type: PowerShell implant
  • Function: Arbitrary command execution, secondary payload download
  • C2 channel / technical specifics: HTTPS; deployed with themed lures related to Israeli-Iranian relations and the Gaza conflict (5)
  • First identified: Microsoft Threat Intelligence — 2024
  • Status: Active

LIONTAIL

  • Type: Passive implant framework (listener)
  • Function: Stealthy backdoor using raw sockets to capture incoming network traffic; command execution via legitimate-looking HTTP requests
  • C2 channel / technical specifics: No active outbound connection — passive architecture that significantly reduces network detection surface (6)
  • First identified: Check Point Research — 2023
  • Status: Active

BellaCiao

  • Type: .NET backdoor
  • Function: Reverse shell, file upload/download, persistence via Windows service
  • C2 channel / technical specifics: Custom DNS resolution to retrieve encoded C2 IP addresses; multiple variants tailored by targeted geographic region (7)
  • First identified: Bitdefender — 2023
  • Status: Active

NokNok

  • Type: macOS backdoor
  • Function: System reconnaissance, screen capture, data exfiltration — first documented macOS backdoor in the APT35 arsenal
  • C2 channel / technical specifics: HTTPS; deployed via a fake VPN application as the initial lure (8)
  • First identified: Proofpoint TA453 — July 2023
  • Status: Active

CharmPower / GRAMDOOR

  • Type: Android / iOS backdoor
  • Function: Mobile surveillance — geolocation, microphone/camera capture, contacts and SMS exfiltration
  • C2 channel / technical specifics: Communication via Telegram Bot API; deployed through fake application stores (9)
  • First identified: Check Point Research — 2022
  • Status: Active

GORBLE

  • Type: Backdoor
  • Function: Remote access, command execution. Lightweight variant documented in rapid compromise campaigns (10)
  • First identified: Mandiant — 2022
  • Status: Uncertain — limited public documentation

Third-party tools and LOLBAS

Mimikatz (credential dumping), Empire / PowerSploit (PowerShell post-exploitation frameworks), Ruler (Exchange attack via MAPI), ngrok / frp (legitimate tunneling), RDP / PuTTY (Lateral Movement), WinPEAS / LinPEAS (reconnaissance and privilege escalation).


4. CAMPAIGN HISTORY

PeriodCampaignTargetsInitial vectorTooling
2014–2017Ajax / NewsBeefIranian dissidents, media, governmentsWatering hole, spear-phishingCredential harvesting, custom tools
2018–2019Operation Newscaster 2US think tanks, journalists, nuclear researchersFake LinkedIn/Twitter identitiesSocial engineering, phishing
2020COVID-19 targetingWHO, Gilead Sciences, pharmaceutical supply chains (11)COVID-themed spear-phishingPOWERSTAR, credential harvesting
2021SpoofedScholarsUS/UK think tanks — Middle East specialists (12)Academic identity impersonationPOWERSTAR, credential harvesting
2022Operation HYPERSCRAPEGmail/Yahoo/Outlook users — Iran and diasporaCredential harvesting, session hijackingHYPERSCRAPE, CharmPower
2023NokNok campaignUS foreign policy experts — Iran/nuclear focus (8)Fake VPN, podcast luresNokNok (macOS), POWERSTAR
2023BellaCiao campaignGovernment organizations — Middle East, India, USA (7)VPN exploitation (Log4Shell, ProxyShell)BellaCiao, LIONTAIL
2024–2025TAMECAT campaignsDefense and nuclear experts — Israel, USA (5)Gaza conflict-themed spear-phishingTAMECAT, POWERSTAR

5. INDICATORS OF COMPROMISE (IOCs)

⚠️ EXPIRY WARNING — The IOCs listed below are sourced exclusively from public sources. Their operational validity is subject to expiry. Do not implement as production blocks without validation in your own environment. Estimated maximum validity: 90 days from the source publication date.

Characteristic network patterns

  • Outbound HTTPS traffic to Cloudflare/AWS-hosted domains with subdomains mail., webmail., login., secure., account.
  • DNS queries impersonating Microsoft services (microsoft-[...].com, outlook-[...].net) or Google
  • Connections to Dropbox API / Google Drive API used as secondary C2 channel
  • Non-standard ports (8080, 8443) for C2 communications
  • Variable beacon intervals with jitter — typically 30–300 seconds
  • Anomalous activity from powershell.exe toward unlisted external endpoints

Historical domains (public sources)

Source: PwC, ClearSky, Microsoft, Proofpoint — public reports 2021–2024. Reduced detection value — threat hunting use only.

  • paypal.com.verify-process[.]net — ClearSky, 2020
  • outlook-account-confirm[.]com — Microsoft, 2021
  • news-bbc[.]site — PwC, 2022
  • secure-signin.app[.]net — Proofpoint TA453, 2023
  • my-lnked-in[.]com — Proofpoint TA453, 2023

Documented public hashes

Hashes partially redacted — refer to source reports for complete values.

ToolSHA256 (partial)SourceYear
POWERSTAR9ab6a3a...8e2f1c0dMandiant2023
HYPERSCRAPEe1f44c5...2b9a7d3eGoogle TAG2022
BellaCiao7f3c8a1...4d6b2e9fBitdefender2023
NokNok3d2e9f1...5c7a4b8eProofpoint2023

Anomalous User-Agents observed

  • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 — combined with illegitimate C2 URLs (POWERSTAR)
  • Agents mimicking legitimate Outlook mobile clients for HYPERSCRAPE API calls

Recommended real-time IOC sources


6. DETECTION & COUNTERMEASURES

Encoded PowerShell with network download (POWERSTAR / TAMECAT) — False positive rate: Medium

process.name = 'powershell.exe'
AND (process.command_line CONTAINS '-EncodedCommand'
     OR process.command_line CONTAINS '-enc')
AND network.destination NOT IN whitelist_domains
AND NOT process.parent.name IN ['explorer.exe', 'svchost.exe']

Recommended tools: Microsoft Defender for Endpoint, CrowdStrike Falcon, Splunk ES, Elastic SIEM.


Credential harvesting — fake portals (DNS) — False positive rate: Low

dns.query MATCHES /^(mail|login|secure|webmail|account)\./
AND dns.domain NOT IN corporate_dns_whitelist
AND dns.domain RESEMBLES ['microsoft', 'outlook', 'google', 'gmail']
AND dns.registrant_age < 30_days

Recommended tools: Cisco Umbrella, Infoblox, Palo Alto DNS Security, DNS sinkhole.


LIONTAIL — passive listener (raw socket) — False positive rate: Low

process OPENS raw_socket
AND process.name NOT IN ['wireshark', 'tcpdump', 'npcap']
AND process.signed = false

Recommended tools: CrowdStrike Falcon, SentinelOne, Vectra NDR, Darktrace.


Organizational countermeasures

  • Deploy phishing-resistant MFA (FIDO2/passkeys) on all exposed accounts — priority: email, VPN, remote access
  • Targeted awareness for high-risk profiles: researchers, journalists, foreign policy experts, diplomats
  • Enhanced monitoring of mailbox access from unlisted IPs or unusual User-Agents
  • Block downloads of Office documents with macros from unverified senders
  • Regular audit of automatic forwarding rules configured on mailboxes (frequent HYPERSCRAPE target)
  • Implement out-of-band identity verification before sharing sensitive documents with external contacts
  • Restrict PowerShell execution to Constrained Language Mode on non-administrator workstations
  • Deploy YARA rules on endpoints for documented families (POWERSTAR, BellaCiao, NokNok)

SOURCES

  1. CISA / FBI / CNMF — Iran-based Threat Actor Exploits VPN Vulnerabilitieshttps://www.cisa.gov/news-events/alerts/2020/09/15/iran-based-threat-actor-exploits-vpn-vulnerabilities — 2020
  2. Microsoft MSTIC — Mint Sandstorm targeting high-value individualshttps://www.microsoft.com/en-us/security/blog/2024/04/17/mint-sandstorm/ — 2024
  3. Mandiant / Google Cloud — POWERSTAR Backdoor Analysishttps://www.mandiant.com/resources/blog/apt35-operations-since-2021 — 2023
  4. Google TAG — New Iranian APT data extraction toolhttps://blog.google/threat-analysis-group/new-iranian-apt-data-extraction-tool/ — 2022
  5. Microsoft Threat Intelligence — TAMECAT spearphishing campaignhttps://www.microsoft.com/en-us/security/blog/ — 2024
  6. Check Point Research — LIONTAIL Frameworkhttps://research.checkpoint.com/2023/liontail/ — 2023
  7. Bitdefender — BellaCiao: A Deadly Combination of Espionage and Destructionhttps://www.bitdefender.com/blog/labs/bellaciao — 2023
  8. Proofpoint — TA453 Targets with NokNok Malwarehttps://www.proofpoint.com/us/blog/threat-insight/ta453-targets-with-noknok-malware — 2023
  9. Check Point Research — CharmPower: the APT35 PowerShell Backdoorhttps://research.checkpoint.com/2022/apt35-charmpower-the-good-the-bad-and-the-powershell/ — 2022
  10. Mandiant — APT35 Group Profilehttps://www.mandiant.com/resources/apt35-operations — 2022
  11. Reuters / Microsoft MSTIC — Charming Kitten targets COVID-19 vaccine makers — 2020
  12. Proofpoint — Operation SpoofedScholars: A Confirmed Iranian Operationhttps://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-confirmed-iranian-operation — 2021
  13. MITRE ATT&CK — APT35 Group G0059https://attack.mitre.org/groups/G0059/
  14. ClearSky — The Kittens Are Back in Townhttps://www.clearskysec.com/wp-content/uploads/2019/09/The-Kittens-Are-Back-in-Town.pdf — 2019
  15. PwC — Yellow Garuda — Publicly available threat intelligence — 2022

This report is produced on the basis of publicly available open sources (vendors, CERTs, independent researchers), consolidated as of March 2026. It does not rely on any classified source. Attribution to the IRGC-IO is assessed at high confidence based on multi-vendor convergence (Mandiant, Microsoft, CrowdStrike, Proofpoint, ClearSky) and consistent technical artifacts. IOCs have a limited lifespan and must be validated before any operational use. This report is unrestricted (TLP:CLEAR).