Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ferocious Kitten APT Deploying MarkiRAT to Capture Keystroke and Clipboard Logging

Posted on November 12, 2025November 12, 2025 By CWS

Ferocious Kitten has emerged as a big cyber-espionage risk focusing on Persian-speaking people inside Iran since not less than 2015.

The Iranian-linked superior persistent risk group operates with a extremely targeted goal, using politically themed decoy paperwork to govern victims into executing weaponized recordsdata.

Over time, the group developed a classy customized implant often called MarkiRAT, which supplies intensive knowledge assortment capabilities together with keystroke logging, clipboard knowledge seize, screenshot performance, and credential harvesting with staged knowledge exfiltration via HTTP and HTTPS protocols.

The group’s assault methodology depends on spearphishing campaigns delivering malicious Microsoft Workplace paperwork embedded with Visible Primary for Purposes macros.

These crafted emails goal dissidents, activists, and people perceived as threats to the Iranian regime. As soon as a sufferer opens a weaponized doc, the embedded macros execute with user-level privileges, establishing a system foothold.

The social engineering proves remarkably efficient, as bait paperwork include anti-regime propaganda that reinforces perceived legitimacy to targets.

Following preliminary execution, the malware deploys a number of persistence mechanisms.

Picus Safety’s safety analysts recognized that MarkiRAT variants make use of subtle hijacking methods implanting the malware alongside authentic functions.

Sure variants seek for Telegram or Chrome installations, copy themselves into software directories, and modify shortcuts to execute the malware earlier than launching the authentic software.

This method stays efficient as a result of customers understand functions functioning usually after execution.

Protection Evasion and Assortment Mechanisms

The malware employs a number of evasion ways to bypass detection and safety controls. One approach includes the Proper-to-Left Override (RTLO) Unicode trick, which manipulates filename show inside file explorers.

By inserting the Unicode character U+202E into executable filenames, attackers make malicious recordsdata seem as innocent media recordsdata similar to photographs or movies.

A file named “MyVideou202E4pm.exe” shows as “MyVideoexe.mp4” to customers, dramatically growing execution likelihood amongst non-technical victims.

MarkiRAT’s assortment capabilities symbolize its core performance. The implant maintains persistent beaconing threads speaking with command-and-control servers utilizing HTTP POST and GET requests.

The malware systematically information consumer keystrokes and clipboard contents, then exfiltrates this intelligence to distant servers.

Critically, Picus Safety researchers famous that MarkiRAT targets particular credential storage codecs together with KeePass databases (.kdbx) and PGP key recordsdata (.gpg).

The malware terminates KeePass processes earlier than keystroke logging begins, forcing customers to re-enter grasp passwords, thereby capturing authentication credentials.

The group demonstrates adaptive operational safety by checking for put in safety software program similar to Kaspersky and Bitdefender.

Ferocious Kitten’s collection-focused methodology and sustained focusing on reveal a company prioritizing intelligence gathering, establishing this group as a persistent and evolving risk to Persian-speaking populations globally.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT, Capture, Clipboard, Deploying, Ferocious, Keystroke, Kitten, Logging, MarkiRAT

Post navigation

Previous Post: New Quantum Route Redirect Tool Lets Attackers Launch One-Click Phishing Attacks on Microsoft 365 Users
Next Post: Chrome Patches High-severity Implementation Vulnerability in V8 JavaScript engine

Related Posts

SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation Cyber Security News
Federal IT contractor Agrees to Pay $14.75M Over False Cybersecurity Services Claim Cyber Security News
Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments Cyber Security News
CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks Cyber Security News
CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure Cyber Security News
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark