Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Origins  





2 History  



2.1  Operation Saffron Rose  





2.2  Operation Woolen-Goldfish  





2.3  Oyun  





2.4  Telegram hack  







3 References  





4 External links  














Rocket Kitten






עברית
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Rocket Kitten or the Rocket Kitten Group is a hacker group thought to be linked to the Iranian government.[1] The threat actor group has targeted organizations and individuals in the Middle East, particularly Israel, Saudi Arabia, Iran as well as the United States and Europe.

Origins[edit]

Cybersecurity firm FireEye first identified the group as Ajax Security Team,[2] writing that the group appears to have been formed in 2010 by the hacker personas "Cair3x" and "HUrr!c4nE!". By 2012, the threat actor group turned their focus to Iran's political opponents.[3] Their targeted attack campaigns, dubbed "Rocket Kitten", have been known since mid-2014.[4] By 2013 or 2014, Rocket Kitten had shifted its focus to malware-based cyberespionage.[3]

Security firm Check Point describes Rocket Kitten as an "attacker group of Iranian origin."[1]

Rocket Kitten's code uses Persian language references. The group's targets are involved in defense, diplomacy, international affairs, security, policy research, human rights, and journalism. According to Check Point, the group has targeted Iranian dissidents, the Saudi royal family, Israeli nuclear scientists and NATO officials. Security researchers found that they carried out a "common pattern of spearphishing campaigns reflecting the interests and activities of the Iranian security apparatus."[4] Other researchers determined that Rocket Kitten's attacks bore a similarity to those attributed to Iran's Revolutionary Guards.[4] Intelligence officials from the Middle East and Europe linked Rocket Kitten to the Iranian military establishment.[2] Rocket Kitten favours a Remote Access Trojan,[5] and by 2015, researchers found it was using customised malware.[2]

History[edit]

Operation Saffron Rose[edit]

Cybersecurity firm FireEye released a report in 2013 finding that Rocket Kitten had conducted several cyberespionage operations against United States defense industrial base companies. The report also detailed the targeting of Iranian citizens who use anti-censorship tools to bypass Iran's Internet filters.[3]

Operation Woolen-Goldfish[edit]

Trend Micro identified the Operation Woolen-Goldfish campaign in a March 2015 paper. The campaign included improved spearphishing content.[1]

Oyun[edit]

In November 2015, security errors by Rocket Kitten allowed the firm Check Point to gain password-less root access to "Oyun", the hackers' back-end database. They discovered an application that was able to generate personalized phishing pages and contained a list of over 1,842 individual targets.[2][6] Among Rocket Kitten's spearphishing targets from June 2014 to June 2015, 18% were from Saudi Arabia, 17% were from the United States, 16% were from Iran, 8% were from the Netherlands, and 5% were from Israel.[2] Analysts used credentials to access key logs of the group's victims and found that Rocket Kitten had apparently tested their malware on their own workstations and failed to erase the logs from the data files.[6] Check Point identified an individual named Yaser Balaghi, going by Wool3n.H4t, as a ringleader of the operation.[5]

Telegram hack[edit]

In August 2016, researchers identified Rocket Kitten as being behind a hack of Telegram, a cloud-based instant messaging service. The hackers exploited Telegram's reliance on SMS verification, comprising over a dozen accounts and stealing the user IDs and telephone numbers of 15 million Iranians who use the software. Opposition organizations and reformist political activists were among the victims.[4]

References[edit]

  1. ^ a b c "Rocket Kitten: A Campaign With 9 Lives" (PDF). Check Point. 2015.
  • ^ a b c d e Jones, Sam (April 26, 2016). "Cyber warfare: Iran opens a new front". Financial Times.
  • ^ a b c "Operation Saffron Rose" (PDF). FireEye. 2013. Retrieved 26 December 2016.
  • ^ a b c d Menn, Joseph; Torbati, Yeganeh (2 August 2016). "Exclusive: Hackers accessed Telegram messaging accounts in Iran - researchers". Reuters.
  • ^ a b Carman, Ashley (9 November 2015). "Supposed mastermind behind 'Rocket Kitten' APT identified in research paper". SC Magazine US.
  • ^ a b Muncaster, Phil (10 November 2015). "Opsec Blunders Expose Rocket Kitten Masterminds". Infosecurity Magazine.
  • External links[edit]


    Retrieved from "https://en.wikipedia.org/w/index.php?title=Rocket_Kitten&oldid=1189082027"

    Categories: 
    Cybercrime
    Cyberwarfare
    Hacker groups
    Hacking in the 2010s
    Military units and formations established in the 2000s
    Science and technology in Iran
    Iranian advanced persistent threat groups
    Hidden categories: 
    Articles with short description
    Short description matches Wikidata
     



    This page was last edited on 9 December 2023, at 15:58 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki