French security firm HarfangLab published research on January 31, 2026, detailing an Iran-linked espionage campaign they call RedKitten. The operation targets human rights NGOs and activists documenting alleged human rights violations during Iran’s ongoing protests, using AI-generated Office macros and a previously unknown backdoor called SloppyMIO.

Campaign overview

AttributeDetails
Campaign nameRedKitten
DiscoveryHarfangLab (January 2026)
Samples obtainedJanuary 23, 2026
Analysis publishedJanuary 29, 2026
AttributionIran-affiliated (moderate confidence)
TargetsHuman rights NGOs, activists, Kurdish community
Estimated victims50+ individuals directly impacted
Initial accessMacro-enabled Excel documents
BackdoorSloppyMIO
Notable techniqueAI-generated (LLM) malware code

Context: Iran’s 2025-2026 protests

The campaign coincides with nationwide unrest in Iran that began in late 2025, protesting soaring inflation, rising food prices, and currency depreciation. The government crackdown has resulted in mass casualties and internet blackouts.

FactorImpact on campaign
Mass protestsCreates pool of potential targets
Missing personsEmotional manipulation opportunity
Diaspora activismExpands target surface internationally
Documentation effortsNGOs become high-value targets

RedKitten specifically targets individuals seeking information about missing persons and protesters who died—exploiting emotional distress to increase phishing effectiveness.

Target profile

CategoryTargeted
Human rights NGOsYes
Activists documenting violationsYes
Kurdish communityParticular focus
AcademicsYes
Government officialsYes
Business leadersYes

HarfangLab believes the intended targets are “non-governmental organizations and individuals involved in documenting recent human rights violations, as well as the horrendous level of violence demonstrated by the Iranian regime towards protesters.”

Attack chain

Phase 1: Initial access

StepAction
1Victim receives 7-Zip archive with Farsi filename
2Archive contains macro-enabled Excel documents (.XLSM)
3Documents claim to list protesters who died in Tehran (December 22, 2025 - January 20, 2026)

Phase 2: Payload delivery

StepAction
1Macro executes when document is opened
2VBA dropper writes C# source and configuration to disk
3DLL compiled locally on victim system
4AppDomainManager injection via legitimate Windows binary
5SloppyMIO backdoor deployed
6Persistence established via scheduled tasks

AppDomainManager injection technique

The attack uses a sophisticated execution method:

StepAction
1VBA macro writes malicious C# code to disk
2Code compiled into DLL using local .NET compiler
3Legitimate Windows binary (AppVStreamingUX.exe) targeted
4DLL injected via AppDomainManager hijacking
5Malicious code runs in context of trusted process

This technique, previously observed in Tortoiseshell campaigns, makes detection more difficult because the malicious code runs within a legitimate Windows process.

Fabricated victim data

Analysis of the spreadsheet data revealed inconsistencies between ages and dates of birth, suggesting the victim lists were fabricated to maximize emotional manipulation. The attackers created believable-looking data about deceased protesters to entice targets into opening the documents.

AI-generated malware

HarfangLab’s analysts believe the macro code was generated using a large language model (LLM):

Evidence of AI involvement

IndicatorSignificance
Oddly named variablesInconsistent with human coding patterns
Structured commentsRead like automated notes
Distinctive code patternsMatch AI-assisted output
Polymorphic variantsEach infection generates slightly different code
Overall VBA styleCharacteristic of LLM generation

Why AI-generated malware matters

FactorImpact
Rapid developmentAccelerates malware creation
PolymorphismEach variant evades signature detection
Lower barrierLess skilled operators can produce functional malware
Detection challengesTraditional signatures ineffective

The use of AI accelerates malware development and creates variants that evade signature-based detection.

SloppyMIO backdoor

The name “SloppyMIO” reflects its messy, inconsistent code structure—likely a result of AI generation with limited human refinement.

Technical characteristics

AttributeDetails
LanguageC#
Configuration storageGitHub Gists, Google Drive
Configuration methodSteganographic images
Payload retrievalGoogle Drive (modular)
Command-and-controlTelegram Bot API
PersistenceScheduled tasks
Traffic blendingAll legitimate cloud services

Capabilities

FunctionDescription
KeyloggingCaptures keystrokes on schedule
ScreenshotsPeriodic screen capture
Document harvestingFilters by file extension and keywords
Credential theftTargets Chrome and Firefox
Data exfiltrationUploads to attacker-controlled Google Drive
Self-updateFetches signed payloads from GitHub
PersistenceScheduled tasks survive reboot
Modular designCan fetch and cache multiple modules
Steganographic configExtracts settings from images in GitHub Gists
Arbitrary commandsExecute remote instructions

Infrastructure

ComponentServicePurpose
Dead Drop ResolverGitHubConfiguration retrieval
Payload hostingGitHubSigned module delivery
Configuration storageGoogle DriveDynamic settings
Command-and-controlTelegram Bot APIBidirectional communication
ExfiltrationGoogle DriveStolen data upload

All traffic uses legitimate cloud services, blending with normal organizational traffic.

Attribution

HarfangLab links RedKitten to Iran-affiliated actors with moderate confidence:

EvidenceDetails
Farsi artifactsLanguage strings in tooling
Infrastructure overlapsConnections to known IRGC-linked clusters
Target selectionDiaspora monitoring consistent with Iranian intelligence priorities
Tactical similaritiesMatches Tortoiseshell campaigns using malicious Excel documents
GitHub as DDRTechnique observed in Iranian clusters since 2022
Telegram C2Consistent with Iranian APT TTPs

”Kitten” acknowledgment

Researchers noted “tongue-in-cheek” use of kitten imagery in payloads—possibly acknowledging the cybersecurity community’s convention of naming Iran-linked groups with “Kitten” suffixes (Charming Kitten, Rocket Kitten, etc.).

Evasion techniques

TechniquePurpose
Legitimate cloud servicesC2 traffic blends with normal activity
Polymorphic codeEach infection looks different
Signed GitHub payloadsAppear legitimate to security tools
Scheduled task persistenceStandard Windows mechanism
Telegram C2Encrypted, difficult to inspect

Detection challenges

Network-level detection is difficult because all malicious traffic flows through Google Drive, GitHub, and Telegram—services organizations typically allow.

ServiceLegitimate useMalicious use
Google DriveDocument collaborationExfiltration, configuration
GitHubCode hostingPayload delivery, DDR
TelegramMessagingC2 communication

Recommendations

For human rights organizations and NGOs

PriorityAction
CriticalDisable macros from external documents by default
HighMonitor cloud service traffic for anomalies
HighVerify document sources—be suspicious of emotionally charged content
HighImplement EDR for behavioral detection
HighBrief staff on grant-themed and human rights-themed phishing lures
MediumUse document preview rather than opening suspicious files

Detection indicators

IndicatorMeaning
Excel documents with Farsi filenames in 7-Zip archivesInitial access attempt
Macro execution followed by GitHub downloadsPayload retrieval
Telegram API connections from non-Telegram applicationsC2 communication
Google Drive uploads from unexpected processesExfiltration
Scheduled tasks created by Office applicationsPersistence mechanism

For security teams

PriorityAction
HighMonitor for GitHub API calls from Office processes
HighAlert on Telegram connections from non-standard applications
HighReview scheduled task creation from Office applications
MediumImplement DLP for Google Drive uploads
OngoingTrack Iran-linked APT TTPs

Context

RedKitten demonstrates how state-sponsored actors exploit humanitarian crises to target the very people trying to document abuses. The use of AI-generated malware lowers the barrier for creating evasive, polymorphic code.

The campaign’s focus on the Kurdish community and human rights activists aligns with known Iranian intelligence priorities. The emotional manipulation tactics—using fabricated lists of deceased protesters—represent a particularly cynical exploitation of genuine human tragedy.

Organizations working on Iran-related human rights issues should assume they are targeted and implement defensive measures accordingly. The combination of AI-accelerated malware development, legitimate cloud infrastructure abuse, and emotional manipulation makes RedKitten a sophisticated and concerning threat.

Steganographic configuration

SloppyMIO uses an unusual configuration retrieval method:

StepAction
1Implant queries GitHub Gist for image file
2Image contains hidden configuration data
3Steganographic extraction reveals C2 addresses
4Modular payloads fetched from Google Drive
5Configuration updated without pushing new malware

This technique allows attackers to update C2 infrastructure without modifying the deployed malware, making detection and blocking more difficult.

Comparison to Tortoiseshell

RedKitten shares tactical similarities with previous Iranian campaigns:

TechniqueTortoiseshellRedKitten
Initial accessMalicious ExcelMalicious Excel
Injection methodAppDomainManagerAppDomainManager
C2 platformTelegramTelegram
ConfigurationGitHubGitHub Gists
ExfiltrationCloud servicesGoogle Drive
AI assistanceUnknownConfirmed

The overlap suggests either the same threat actor or shared tooling within the Iranian APT ecosystem.