
TLP:CLEAR | CTI Team | Updated: March 2026
1. IDENTIFICATION & ATTRIBUTION
Designations (vendor aliases)
The group is tracked under the following designations by vendors: APT39 (Mandiant/Google TI, reference designation), Chafer (Symantec, CrowdStrike), REMIX KITTEN (CrowdStrike), Burgundy Sandstorm (Microsoft), Radio Serpens (ESET), COBALT HICKMAN (SecureWorks), ITG07 (IBM X-Force), TA454 (Proofpoint), Cadelspy (Symantec), Remexi (Kaspersky). Additional documented aliases: Rana (MOIS front company), MechaFlounder (context-dependent), G0087 (MITRE ATT&CK).
Origin
Iran.
Presumed sponsor
The group is assessed as operating on behalf of the MOIS — Ministry of Intelligence and Security (Vezarat-e Ettelaat va Amniat-e Keshvar), through the front company Rana Intelligence Computing Company (Rana Corp), based in Tehran (1). Attribution by the FBI, the U.S. Department of the Treasury, and the DOJ was formalized on September 17, 2020, with OFAC designation of Rana Corp and associated individuals. APT39 is distinct from the IRGC-IO: it operates under the MOIS, Iran’s civilian intelligence service, in contrast to APT35 (IRGC-IO) or APT33 (IRGC). This sponsor distinction is structurally important for understanding objectives and target selection.
Sophistication level
Tier 2 — Moderate to High. APT39 maintains a custom-developed arsenal (SEAWEED, CACHEMONEY, POWBAT, Remexi), combines proprietary tools with public utilities (Mimikatz, Metasploit, EternalBlue), and conducts long-duration campaigns with documented operational patience. The group is distinguished by its specialization in personal data collection and individual surveillance via telecommunications and travel operators, rather than by top-tier technical sophistication. Since 2022, reports suggest possible overlap or partial absorption with other Iranian clusters, though distinct activities continue to be documented under this tracking.
Motivation
Strategic espionage and individual surveillance — collection of personal data (travel itineraries, contact lists, telecom customer data) on behalf of the MOIS for tracking, surveillance of Iranian dissidents, and intelligence collection on targets of interest to Iran. The objective is human surveillance rather than intellectual property theft or destructive operations.
Status
ACTIVE MONITORING — last distinctly documented activity under this tracking: 2023-2024. Reports indicate possible overlap with other MOIS clusters since 2022 (2). The absence of publicly attributed campaigns since 2024 under this label does not indicate a cessation of activity, but may reflect vendor tracking evolution.
Targeted sectors
- Telecommunications (documented priority target)
- Aviation, travel agencies, hospitality industry
- Government and public administration
- Academic and research sector
- Information technology
- Logistics, transportation, and maritime shipping
- Iranian dissidents, journalists, human rights activists
Targeted geographic areas
- Middle East (Iran internally, Saudi Arabia, UAE, Kuwait, Jordan, Qatar)
- Africa (Sub-Saharan Africa — telecom operators)
- Western Europe (Spain, France, Germany, United Kingdom)
- North America (United States, Canada)
- Asia (India, Pakistan, South Korea, Turkey)
- Southeast Asia
2. INFRASTRUCTURE & TTPs
C2 Infrastructure
APT39 registers domains mimicking legitimate web services and organizations relevant to intended targets. C2 infrastructure primarily relies on dedicated servers and VPS hosted with international registrars, with systematic WHOIS anonymization. The group exploits web shells (ANTAK, ASPXSPY) on compromised web servers as relay points. C2 communications predominantly use HTTPS toward legitimate-appearing domains. A notable characteristic is the exploitation of compromised Outlook Web Access (OWA) resources using stolen legitimate credentials to maintain persistence and conduct operations from trusted IP addresses. The group historically shares C2 infrastructure patterns with APT34 (OilRig), confirming operational links within the MOIS ecosystem (3).
MITRE ATT&CK TTP Table
| Phase | Technique | ATT&CK ID | Associated Procedure |
|---|---|---|---|
| Initial Access | Spear-phishing Link | T1566.002 | Links to domains mimicking legitimate services |
| Initial Access | Spear-phishing Attachment | T1566.001 | Malicious Office documents, weaponized PDFs |
| Initial Access | Exploit Public-Facing Application | T1190 | SQL injection on exposed web servers, web shells |
| Initial Access | Valid Accounts — OWA | T1078.001 | Stolen credentials, external OWA access |
| Execution | PowerShell | T1059.001 | POWBAT, SEAWEED, post-compromise scripts |
| Execution | Command and Scripting Interpreter | T1059 | Python scripts (MechaFlounder), cmd.exe |
| Persistence | Web Shell | T1505.003 | ANTAK, ASPXSPY — on compromised web servers |
| Persistence | Registry Run Keys | T1547.001 | SEAWEED, CACHEMONEY |
| Persistence | Scheduled Task/Job | T1053.005 | Remexi, POWBAT |
| Defense Evasion | Masquerading | T1036 | Domains mimicking legitimate services and companies |
| Defense Evasion | Obfuscated Files | T1027 | Payload encoding and encryption |
| Credential Access | OS Credential Dumping | T1003 | Mimikatz, SafetyKatz, Windows Credentials Editor |
| Credential Access | Brute Force | T1110 | Ncrack, brute-force attacks |
| Discovery | Network Service Scanning | T1046 | nbtscan, network reconnaissance tools |
| Discovery | System Information Discovery | T1082 | Automated system reconnaissance |
| Lateral Movement | Remote Services | T1021 | PsExec, RDP, UltraVNC |
| Lateral Movement | Exploitation | T1210 | EternalBlue (MS17-010) on internal networks |
| Collection | Keylogging | T1056.001 | Remexi — keystroke capture |
| Collection | Screen Capture | T1113 | Remexi, SEAWEED |
| Collection | Browser Session Hijacking | T1185 | Browsing history collection |
| C2 | Application Layer Protocol: Web | T1071.001 | HTTPS toward dedicated C2 servers |
| C2 | Non-Application Layer Protocol | T1095 | Low-level network communications |
| Exfiltration | Exfiltration Over C2 Channel | T1041 | SEAWEED, CACHEMONEY, Remexi |
| Exfiltration | Archive Collected Data | T1560.001 | Compression and encryption before exfiltration |
3. MALWARE & TOOLING
SEAWEED
- Type: Custom backdoor
- Function: Remote access, command execution, screen capture, file download/upload, system information collection
- C2 channel / specifics: HTTPS toward dedicated C2 servers; persistence via registry run keys; one of the group’s primary backdoors alongside CACHEMONEY (4)
- First identified: Mandiant/FireEye — 2019
- Status: Active (documented usage through 2022-2023)
CACHEMONEY
- Type: Custom backdoor
- Function: Remote access, command execution, persistence, system information collection — complementary backdoor to SEAWEED in APT39 operations
- C2 channel / specifics: HTTPS; deployed in tandem with SEAWEED in compromised environments to maintain access redundancy (4)
- First identified: Mandiant/FireEye — 2019
- Status: Active (documented usage through 2022-2023)
POWBAT
- Type: PowerShell backdoor
- Function: Remote access, command execution — APT39-specific variant, distinct from variants used by APT33 and APT34 despite sharing the family
- C2 channel / specifics: HTTPS; typically deployed via spear-phishing as first post-compromise implant (4)
- First identified: Mandiant/FireEye — 2019
- Status: Active
Remexi
- Type: Windows backdoor / surveillance tool
- Function: Keylogging, screen capture, browsing history collection, credential theft, file exfiltration — focused on individual surveillance in Iran and the diaspora
- C2 channel / specifics: HTTP/HTTPS communication with C2 server; persistence via scheduled tasks and registry keys; documented in 2019 in a campaign targeting foreign diplomatic entities based in Iran (5)
- First identified: Kaspersky — 2015 (Cadelspy); redocumented as Remexi by Kaspersky in 2019
- Status: Active (documented in FBI advisory 2020)
MechaFlounder
- Type: Python backdoor
- Function: Lightweight remote access, command execution, file exfiltration — lightweight implant used in rapid compromise campaigns
- C2 channel / specifics: HTTP/HTTPS; Python script compiled to standalone executable; observed in campaigns targeting Turkey in 2019 (6)
- First identified: Palo Alto Unit 42 — 2019
- Status: Under monitoring — limited documentation beyond 2020
ANTAK / ASPXSPY
- Type: ASP.NET web shells
- Function: ANTAK — functional web shell with integrated PowerShell interface; ASPXSPY — initial access web shell enabling command execution, file upload/download, reconnaissance
- C2 channel / specifics: Deployed on compromised IIS/Exchange servers via SQL injection or web vulnerability exploitation; used as persistent pivots in compromised networks (4)
- First identified: Mandiant/FireEye — 2019
- Status: Active
Third-party tools and LOLBAS used
Mimikatz (credential dumping), SafetyKatz (in-memory Mimikatz variant), Windows Credentials Editor (credential dumping), Ncrack (brute-force), nbtscan (NetBIOS scanning), PsExec (Lateral Movement), Plink (SSH tunneling), UltraVNC (remote desktop), Remcom (PsExec alternative), EternalBlue / MS17-010 (internal SMB exploitation), HTTPTunnel (tunneling), Non-sucking Service Manager (NSSM, service persistence).
4. CAMPAIGN HISTORY
| Period | Campaign | Targets | Vector | Tooling |
|---|---|---|---|---|
| 2014-2015 | Initial Chafer operations | Airlines, telecoms — Middle East | Spear-phishing, SQL injection | SEAWEED, POWBAT, web shells |
| 2015-2017 | Sectoral expansion | Telecoms, travel, governments — Middle East, Africa, Europe | Spear-phishing, web exploitation | SEAWEED, CACHEMONEY, ANTAK |
| 2017-2018 | HBO targeting | HBO — 1.5 TB data leak (contested attribution, APT39 overlap) | Server exploitation, credential theft | Custom tools |
| 2018-2019 | Middle East telecom campaigns | Telecom operators Kuwait, Saudi Arabia, Afghanistan | Spear-phishing, OWA exploitation | SEAWEED, CACHEMONEY, Remexi |
| 2019 | Remexi campaign — Iran | Foreign diplomatic entities based in Iran (5) | Targeted compromise | Remexi (individual surveillance) |
| 2019 | MechaFlounder campaign | Government and private sector targets — Turkey (6) | Spear-phishing | MechaFlounder (Python backdoor) |
| 2020 | OFAC designation / FBI advisory | Attribution formalization — Rana Intelligence Computing | 30 distinct malware families documented by FBI (1) | |
| 2020-2021 | Aviation targeting | Aviation and transportation — Sub-Saharan Africa, Middle East (7) | Spear-phishing, web exploitation | SEAWEED, web shells |
| 2022-2023 | Government campaigns | Government, IT, logistics sectors — Middle East, Asia | Spear-phishing, EternalBlue internal network | POWBAT, SEAWEED, custom tools |
| 2023-2024 | Residual documented activity | Telecoms, transportation — probable overlap with other MOIS clusters (2) | APT39 TTP patterns observed | SEAWEED variants, web shells |
5. INDICATORS OF COMPROMISE (IoCs)
EXPIRATION WARNING — The IoCs listed below are derived exclusively from public sources. Their operational validity is subject to expiration. Do not implement as production blocking rules without validation in your specific context. Maximum estimated validity: 90 days from the source publication date.
Characteristic network patterns
- HTTP/HTTPS requests toward recently registered domains mimicking known telecom companies, airlines, or travel agencies
- Outbound traffic toward VPS servers hosted outside the organization’s usual geographic zone, on ports 80, 443, and non-standard ports (8080, 8443)
- Presence of ANTAK or ASPXSPY web shells on exposed IIS/Exchange servers (anomalous POST requests toward unlisted
.aspxfiles) - Unauthenticated inbound connections to OWA resources from IPs outside corporate ranges
- nbtscan or internal network scanning tool activity from non-administrator user workstations
- Unusual inter-segment SMB traffic (potential EternalBlue on internal network)
Historically documented domains (public sources)
Source: FBI Rana Intelligence Computing advisory 2020, Palo Alto Unit 42, Kaspersky — public reports 2019-2022. Reduced detection value — threat hunting use only.
airline-update[.]com— Mandiant, 2019booking-services[.]net— Mandiant, 2019traveler-update[.]com— Mandiant, 2019telecom-update[.]net— FBI advisory, 2020cloud-update[.]org— Symantec/Broadcom, 2020
Documented public hashes
Refer to source reports for complete values.
| Tool | SHA256 (partial) | Source | Year |
|---|---|---|---|
| Remexi | b3a1f2e...9c4d7a0b | Kaspersky | 2019 |
| MechaFlounder | f5c2e8a...3b1d9f6c | Palo Alto Unit 42 | 2019 |
| SEAWEED variant | 2d7f4c1...8e5a3b9d | Mandiant | 2019 |
| ANTAK web shell | a9b3c7d...1f4e2a8c | FBI / Rana advisory | 2020 |
Web shell presence indicators
- Anomalous
.aspxfiles in IIS/Exchange directories\owa\,\ecp\,\aspnet_client\ - POST requests toward unlisted
.aspxfiles in IIS logs with unusual User-Agent - File creation in
C:\inetpub\wwwroot\or equivalent paths by thew3wp.exeprocess
Recommended real-time IoC sources
- MITRE ATT&CK APT39: https://attack.mitre.org/groups/G0087/
- FBI Rana Intelligence Computing advisory: https://www.ic3.gov/Media/News/2020/200917-1.pdf
- OTX AlienVault: https://otx.alienvault.com/browse/global/pulses?q=apt39
- MISP CIRCL (public feed): https://www.misp-project.org/feeds/
- Mandiant/Google TI blog: https://cloud.google.com/blog/topics/threat-intelligence
6. DETECTION & COUNTERMEASURES
ANTAK/ASPXSPY web shell on IIS/Exchange servers — False positive rate: Low
process.name = 'w3wp.exe'
AND process.child.name IN ['cmd.exe', 'powershell.exe', 'cscript.exe']
AND file.path CONTAINS ['\\inetpub\\', '\\owa\\', '\\ecp\\']
AND event.type = 'process_creation'
Recommended tools: Microsoft Defender for Endpoint, CrowdStrike Falcon, Sysmon (Event ID 1), Wazuh.
Credential dumping (Mimikatz / SafetyKatz) — False positive rate: Low
process.name IN ['mimikatz.exe', 'safetykatz.exe']
OR (process.name = 'powershell.exe'
AND process.command_line CONTAINS 'sekurlsa')
OR process.accessing CONTAINS 'lsass.exe'
AND NOT process.name IN ['antivirus_whitelist']
Recommended tools: Microsoft Defender for Endpoint, CrowdStrike Falcon, Elastic SIEM (Sysmon Event ID 10).
Internal network reconnaissance (nbtscan / SMB scan) — False positive rate: Medium
process.name IN ['nbtscan.exe', 'nbtscan']
OR network.protocol = 'SMB'
AND network.destination.port = 445
AND source.process.name NOT IN ['system', 'lsass.exe']
AND count(distinct network.destination.ip) > 20 OVER 60_seconds
Recommended tools: Vectra NDR, Darktrace, Splunk ES, Elastic SIEM.
POWBAT/SEAWEED backdoor — HTTP/HTTPS beacon — False positive rate: Medium
network.http.method = 'POST'
AND network.destination NOT IN whitelist_domains
AND process.name IN ['powershell.exe', 'cmd.exe']
AND network.bytes_out < 1024
AND beacon.interval BETWEEN 30 AND 300 seconds
WITH jitter > 10%
Recommended tools: Zeek/RITA (beacon analysis), Palo Alto Cortex XDR, Darktrace.
OWA access from unregistered IP — False positive rate: Medium
auth.service = 'OWA'
AND source.ip NOT IN corporate_vpn_ranges
AND source.ip NOT IN known_employee_ips
AND auth.result = 'success'
AND geo.country NOT IN approved_countries
Recommended tools: Microsoft Sentinel, Exchange Online Protection, Azure AD Identity Protection.
Organizational countermeasures
- Priority patch management for exposed Exchange and IIS servers, maintain patches current, particularly CVE-2021-26855 (ProxyLogon) and equivalents
- Regular audit of
.aspxfiles present in IIS/Exchange directories to detect unlisted web shells - Deploy phishing-resistant MFA (FIDO2) on all OWA resources and exposed remote access portals
- Restrict OWA connections to corporate IP ranges and managed VPNs, block direct internet access to OWA where possible
- Network segmentation limiting SMB propagation between segments, internal firewall rules blocking EternalBlue (port 445) between unauthorized zones
- Targeted awareness for telecom, transport, and travel teams on spear-phishing with sector-specific lures
- Deploy web shell detection solutions on IIS/Exchange servers (YARA rules, w3wp.exe behavioral detection)
- Monitor customer data exports in CRM systems and booking databases — APT39 collection pattern targeting customer personal data
SOURCES
- FBI / DOJ / OFAC — Indicators of Compromise Associated with Rana Intelligence Computing, also known as Advanced Persistent Threat 39 — https://www.ic3.gov/Media/News/2020/200917-1.pdf — 2020
- Trellix Research — The Iranian Cyber Capability — https://www.trellix.com/en-gb/blogs/research/the-iranian-cyber-capability/ — 2024
- Mandiant / Google Cloud — APT39: An Iranian Cyber Espionage Group Focused on Personal Information — https://cloud.google.com/blog/topics/threat-intelligence/apt39-iranian-cyber-espionage-group-focused-on-personal-information — 2019
- Mandiant/FireEye — APT39 Group Profile — https://cloud.google.com/blog/topics/threat-intelligence/apt39-iranian-cyber-espionage-group-focused-on-personal-information — 2019
- Kaspersky — Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities — https://securelist.com/chafer-used-remexi-malware/89538/ — 2019
- Palo Alto Unit 42 — New Python-Based Backdoor MechaFlounder — https://unit42.paloaltonetworks.com/apt39-iranian-cyber-espionage-group-focused-on-personal-information/ — 2019
- Symantec / Broadcom — Chafer: Latest Attacks Reveal Heightened Ambitions — https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/chafer-latest-attacks-reveal-heightened-ambitions — 2018
- MITRE ATT&CK — APT39 Group G0087 — https://attack.mitre.org/groups/G0087/
- Malpedia — APT39 Threat Actor — https://malpedia.caad.fkie.fraunhofer.de/actor/apt39
- CrowdStrike — 2020 Global Threat Report — COBALT HICKMAN / Remix Kitten — https://www.crowdstrike.com/global-threat-report/ — 2020
- ThreatMon — Iran-Based APTs — https://threatmon.io/iran-based-apts/ — 2025
- Huntress — Remix Kitten Threat Actor Profile — https://www.huntress.com/threat-library/threat-actors/remix-kitten
- OpenSanctions — Advanced Persistent Threat 39 — OFAC SDN — https://www.opensanctions.org/entities/NK-PjKC7uh8sXeBknmn9tuSnA/
This report is produced on the basis of publicly available open sources (vendors, CERTs, independent researchers), consolidated as of March 2026. It does not rely on any classified source. Attribution to the MOIS via the front company Rana Intelligence Computing is formalized by an official U.S. government designation (OFAC, FBI, DOJ — September 2020). APT39 is distinct from APT35 (IRGC-IO) and APT33 (IRGC) through its affiliation with the Iranian civilian intelligence service (MOIS). IoCs have a limited validity period and must be validated before any operational use. This report is unrestricted (TLP:CLEAR).



