Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ferocious Kitten APT Deploying MarkiRAT to Capture Keystroke and Clipboard Logging

Posted on November 12, 2025November 12, 2025 By CWS

Ferocious Kitten has emerged as a big cyber-espionage risk focusing on Persian-speaking people inside Iran since not less than 2015.

The Iranian-linked superior persistent risk group operates with a extremely targeted goal, using politically themed decoy paperwork to govern victims into executing weaponized recordsdata.

Over time, the group developed a classy customized implant often called MarkiRAT, which supplies intensive knowledge assortment capabilities together with keystroke logging, clipboard knowledge seize, screenshot performance, and credential harvesting with staged knowledge exfiltration via HTTP and HTTPS protocols.

The group’s assault methodology depends on spearphishing campaigns delivering malicious Microsoft Workplace paperwork embedded with Visible Primary for Purposes macros.

These crafted emails goal dissidents, activists, and people perceived as threats to the Iranian regime. As soon as a sufferer opens a weaponized doc, the embedded macros execute with user-level privileges, establishing a system foothold.

The social engineering proves remarkably efficient, as bait paperwork include anti-regime propaganda that reinforces perceived legitimacy to targets.

Following preliminary execution, the malware deploys a number of persistence mechanisms.

Picus Safety’s safety analysts recognized that MarkiRAT variants make use of subtle hijacking methods implanting the malware alongside authentic functions.

Sure variants seek for Telegram or Chrome installations, copy themselves into software directories, and modify shortcuts to execute the malware earlier than launching the authentic software.

This method stays efficient as a result of customers understand functions functioning usually after execution.

Protection Evasion and Assortment Mechanisms

The malware employs a number of evasion ways to bypass detection and safety controls. One approach includes the Proper-to-Left Override (RTLO) Unicode trick, which manipulates filename show inside file explorers.

By inserting the Unicode character U+202E into executable filenames, attackers make malicious recordsdata seem as innocent media recordsdata similar to photographs or movies.

A file named “MyVideou202E4pm.exe” shows as “MyVideoexe.mp4” to customers, dramatically growing execution likelihood amongst non-technical victims.

MarkiRAT’s assortment capabilities symbolize its core performance. The implant maintains persistent beaconing threads speaking with command-and-control servers utilizing HTTP POST and GET requests.

The malware systematically information consumer keystrokes and clipboard contents, then exfiltrates this intelligence to distant servers.

Critically, Picus Safety researchers famous that MarkiRAT targets particular credential storage codecs together with KeePass databases (.kdbx) and PGP key recordsdata (.gpg).

The malware terminates KeePass processes earlier than keystroke logging begins, forcing customers to re-enter grasp passwords, thereby capturing authentication credentials.

The group demonstrates adaptive operational safety by checking for put in safety software program similar to Kaspersky and Bitdefender.

Ferocious Kitten’s collection-focused methodology and sustained focusing on reveal a company prioritizing intelligence gathering, establishing this group as a persistent and evolving risk to Persian-speaking populations globally.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT, Capture, Clipboard, Deploying, Ferocious, Keystroke, Kitten, Logging, MarkiRAT

Post navigation

Previous Post: New Quantum Route Redirect Tool Lets Attackers Launch One-Click Phishing Attacks on Microsoft 365 Users
Next Post: Chrome Patches High-severity Implementation Vulnerability in V8 JavaScript engine

Related Posts

Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT Cyber Security News
Why Threat Prioritization Is the Key SOC Performance Driver   Cyber Security News
New Harrods Data Breach Exposes 430,000 Customer Personal Records Cyber Security News
Fake Postmark MCP Server Silently Stole Thousands of Emails With a Single Line of Malicious Code Cyber Security News
Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Cyber Security News
North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News