Short title: Iran-aligned social engineering and credential theft specialist with expanding intrusion tooling
APT35, Charming Kitten, Mint Sandstorm, PHOSPHORUS, TA453, IRGC, spear-phishing, credential harvesting, civil society targeting, DIB, universities, Exchange/ManageEngine exploitation


1. Executive Summary

APT35 is a long-running Iran-aligned cyber espionage actor best known for high-touch social engineering, credential harvesting, and targeted spear-phishing against individuals and organisations aligned to Iranian strategic intelligence requirements. Microsoft tracks overlapping activity as Mint Sandstorm (PHOSPHORUS) and assesses links to Iran’s Islamic Revolutionary Guard Corps (IRGC), citing corroboration from multiple security vendors and US government action. (Microsoft)
While many APT35 operations are “low malware” and identity-centric, reporting since 2023–2024 highlights more mature tradecraft in subsets of the ecosystem, including faster adoption of public PoCs for perimeter vulnerabilities and bespoke implants/backdoors in selected intrusions. (Microsoft)
Victimology consistently includes civil society, academia, journalists, policy and Middle East analysts, as well as government and defence-adjacent targets in the UK, US, Israel, and Europe. (Microsoft)


2. Contextual Background

2.1 Nature of the threat

APT35 is commonly described as an intelligence collection actor, with recurring emphasis on:

  • Spear-phishing and credential harvesting (often via spoofed login pages and rapport-building) (NCSC)
  • Targeted social engineering against personal webmail to bypass enterprise controls (NCSC)
  • Opportunistic and targeted exploitation of internet-facing applications, including rapid weaponisation of N-day vulnerabilities by mature subgroups Microsoft attributes to Mint Sandstorm (Microsoft)

Where relevant to APT35-linked intrusions, publicly reported vulnerabilities include:

2.2 Threat-actor attribution

  • Aliases / tracking: APT35 is widely associated with “Charming Kitten”, “PHOSPHORUS/Mint Sandstorm” (Microsoft), and “TA453” (Proofpoint). MITRE ATT&CK lists G0059 with associated names including TA453, Phosphorus, Newscaster, APT35, and Mint Sandstorm. (attack.mitre.org)
  • Attribution to IRGC: Microsoft assesses Mint Sandstorm is associated with an intelligence arm of the IRGC and cites corroboration plus US Treasury action. (Microsoft)
  • Confidence: Likely (A2/B2): Multiple credible sources converge on Iran state alignment and IRGC association, but public reporting often describes overlaps between intrusion sets and subgroups rather than a single monolithic unit. (Microsoft)

2.3 Sector and geographic targeting

Commonly observed target sets include:

  • Civil society and individuals: dissidents, activists, journalists, academics, policy researchers (including UK-linked targeting) (Microsoft)
  • Government and defence-adjacent: defence industrial base, think tanks, government agencies (Microsoft)
  • Critical infrastructure interest (subset): Microsoft describes targeting of US critical infrastructure (seaports, energy, transit) by a mature Mint Sandstorm subgroup. (Microsoft)

3. Technical Analysis

3.1 TTPs and tradecraft (with MITRE ATT&CK mapping)

Reconnaissance and rapport-building

  • Open-source research on targets and interests: T1593 / T1589 (NCSC)
  • Use of fraudulent personas and social accounts: T1585.001 (NCSC)
  • Preference for personal webmail to evade enterprise controls: (behavioural pattern described in UK NCSC advisory) (NCSC)

Initial access

Post-compromise

  • Use of stolen credentials for mailbox access: T1078 (NCSC)
  • Email theft and persistence via forwarding rules: T1114.002 / T1114.003 (NCSC)
  • PowerShell-heavy discovery and automation in intrusions attributed to a mature Mint Sandstorm subgroup: T1059.001 (Microsoft)
  • Lateral movement with Impacket tooling (reported by Microsoft): T1021.002 (SMB/Windows Admin Shares) and related remote execution patterns (mapping inferred from Microsoft’s explicit Impacket mention; technique choice reflects common Impacket use cases) (Microsoft)
  • Scheduled tasks for persistence (reported by Microsoft in one attack chain): T1053.005 (Microsoft)
  • AD database theft objective noted by Microsoft (credential access): T1003.003 (Microsoft)

Malware/tooling (selected public reporting)

  • Proofpoint reports TA453 malware frameworks including BlackSmith delivering a PowerShell trojan AnvilEcho, and describes staging via ZIP/LNK delivery and DLL components. (Proofpoint)
  • Microsoft reports a custom backdoor named MediaPl in a 2023–2024 Mint Sandstorm campaign targeting universities and research organisations. (Microsoft)

3.2 Exploitation status and PoC considerations

  • Actively used social engineering is ongoing: UK NCSC describes continuing spear-phishing activity through 2022 and highlights continued success of TA453-style tradecraft. (NCSC)
  • N-day exploitation acceleration: Microsoft reports faster adoption of public PoCs beginning in early 2023 for a mature subgroup, including same-day use of CVE-2022-47966 PoC and rapid use of CVE-2022-47986. (Microsoft)
  • Broader ecosystem exploitation signals: CISA documents that CVE-2022-47966 exploitation has been used by multiple nation-state actors for initial access, underscoring the likelihood of opportunistic overlap and copycat activity around widely weaponised CVEs. (cisa.gov)

4. Impact Assessment

4.1 Severity and scope

APT35’s impact is often driven less by single “big” malware events and more by:

  • Account compromise (personal and corporate), enabling long-dwell espionage, contact harvesting, and follow-on phishing. (NCSC)
  • Sensitive information theft from mailboxes and collaboration platforms, including policy, research, diplomatic, and activist data. (NCSC)
  • Escalation pathways where intrusion subgroups pivot from perimeter exploits to lateral movement and directory credential access. (Microsoft)

Where APT35-linked subsets exploit critical vulnerabilities, potential impact aligns with the underlying CVSS:

4.2 Victim profile

Observed victim profiles include:

  • Individuals: journalists, activists, academics, researchers, and prominent community figures (Proofpoint examples include medical researchers and a religious figure). (Proofpoint)
  • Organisations: universities/research orgs across Belgium, France, UK, US and Israel (Microsoft), plus DIB/think tanks/government services (Microsoft profile). (Microsoft)

5. Indicators of Compromise (IOCs)

5.1 IOC table (publicly reported)

Note: These IOCs are taken directly from publicly published vendor reporting and are not exhaustive. Validate context before blocking in production.

TypeValueContext/NotesSource
Domain1drv[.]casaCredential harvesting domain used in “BadBlood” campaignProofpoint: “BadBlood” campaign write-up (Proofpoint)
Domain1drv[.]online / 1drv[.]live / 1drv[.]icu / 1drv[.]surf / 1drv[.]xyz / 1drv[.]cyouAdditional reported TA453 phishing domainsProofpoint: “BadBlood” IOC table (Proofpoint)
URL1drv[.]casa/s/AFGHJKFJelMtfZXSXSGkdsjh1Example credential harvesting URL (variants likely)Proofpoint: “BadBlood” IOC table (Proofpoint)
Domainunderstandingthewar[.]orgLure domain used in 2024 podcast-themed operationProofpoint: “Best Laid Plans” IOC list (Proofpoint)
Domaind75[.]siteStorage/stager domain used to download componentsProofpoint: “Best Laid Plans” IOC list (Proofpoint)
Domaindeepspaceocean[.]infoReported C2Proofpoint: “Best Laid Plans” IOC list (Proofpoint)
SHA-2565dca88f08b586a51677ff6d900234a1568f4474bbbfef258d59d73ca4532dcaf.LNK fileProofpoint: “Best Laid Plans” IOC list (Proofpoint)
SHA-2565aee738121093866404827e1db43c8e1a7882291afedfe90314ec90b198afb36Podcast Plan 2024.zipProofpoint: “Best Laid Plans” IOC list (Proofpoint)
SHA-2568a47fd166059e7e3c0c1740ea8997205f9e12fc87b1ffe064d0ed4b0bf7c2ce1qemus (AnvilEcho)Proofpoint: “Best Laid Plans” IOC list (Proofpoint)
File pathC:\Users\Public\Public LibraryDirectory created during BlackSmith installation chainProofpoint: infection chain details (Proofpoint)

5.2 Detection guidance

Network and DNS

  • Alert on DNS/TLS SNI hits for the domains in the IOC table (with careful false-positive handling, as some patterns mimic legitimate brands). Proofpoint references Emerging Threats signature IDs for TA453 domain detections in its 2024 reporting. (Proofpoint)

Email security

  • Prioritise detections for:
    • Rapport-building threads shifting from benign to link delivery (behaviour described by NCSC and Proofpoint). (NCSC)
    • Links to credential harvesting pages that resemble Microsoft/Google login portals, especially when sent to personal webmail addresses. (NCSC)

Endpoint and identity


6. Incident Response Guidance

6.1 Containment, eradication, recovery

  1. Contain identity first: force password resets, revoke refresh tokens, and review MFA enrolments for targeted users (APT35 tradecraft heavily favours credential theft). (NCSC)
  2. Mailbox triage: identify and remove malicious forwarding rules and delegates; review recent OAuth consents and “impossible travel” sign-in patterns. (NCSC)
  3. Scope lateral movement (where intrusion tradecraft is observed): isolate affected hosts, collect volatile artefacts, and review remote execution traces and scheduled task creation. (Microsoft)
  4. Block known infrastructure (domains/hashes) from vetted IOC lists and re-scan for related artefacts.

6.2 Forensic artefacts to preserve

  • Email headers and full message bodies for suspected rapport-building and link delivery. (NCSC)
  • Authentication logs (IdP, O365/Google Workspace), mailbox audit logs, forwarding rule changes. (NCSC)
  • Endpoint artefacts: LNK files, ZIP staging, PowerShell operational logs, scheduled tasks, and any DLL drops matching published hashes. (Proofpoint)

6.3 Lessons learned

  • Reduce reliance on user judgement: improve phishing-resistant MFA and implement stronger identity governance for high-risk individuals and executives.

7. Threat Intelligence Contextualisation

7.1 Similar incident patterns

APT35’s approach strongly resembles other “human-targeted” espionage clusters where patient social engineering is the primary access vector, with selective malware use when credential access alone is insufficient (as reflected in UK NCSC spear-phishing reporting and Proofpoint’s TA453 campaigns). (NCSC)

7.2 ATT&CK mapping table (observed)

TacticTechnique IDTechnique NameObserved behaviour
ReconnaissanceT1593Search Open Websites/DomainsOSINT research on targets and hooks (NCSC)
ReconnaissanceT1589Gather Victim Identity InformationProfiling victims via open sources (NCSC)
Resource DevelopmentT1585.001Establish Accounts: Social Media AccountsFake personas for engagement (NCSC)
Resource DevelopmentT1583.001Acquire Infrastructure: DomainsLookalike domains and phishing infra (NCSC)
Initial AccessT1566.002Phishing: Spearphishing LinkLink delivery after rapport-building (NCSC)
Initial AccessT1190Exploit Public-Facing ApplicationN-day exploitation by mature subgroup (Microsoft)
Initial AccessT1078Valid AccountsUse of stolen credentials for access (NCSC)
CollectionT1114.002Remote Email CollectionInbox access and theft (NCSC)
Collection/PersistenceT1114.003Email Forwarding RuleForwarding rules for ongoing visibility (NCSC)
ExecutionT1059.001PowerShellPowerShell-heavy chains and tooling (Microsoft)
PersistenceT1053.005Scheduled TaskScheduled tasks in Microsoft-described chain (Microsoft)
Credential AccessT1003.003OS Credential Dumping: NTDSAD database theft objective described by Microsoft (Microsoft)

8. Mitigation Recommendations

8.1 Hardening and best practices

  • Enforce phishing-resistant MFA (FIDO2/WebAuthn) for high-risk users; reduce reliance on SMS/OTP where feasible.
  • Implement conditional access rules (device compliance, geo-velocity, risky sign-in blocks) and monitor for MFA fatigue patterns.
  • Disable or tightly control auto-forwarding to external domains and alert on forwarding rule creation. (NCSC)
  • Improve executive protection: pre-emptive training focused on rapport-building approaches and “conference invite / podcast / journalist” lures described in public reporting. (NCSC)

8.2 Patch management advice (risk-driven)

Prioritise internet-facing assets and CVEs with public PoCs, consistent with Microsoft’s reporting on rapid PoC adoption: (Microsoft)


9. Historical Context & Related Vulnerabilities

  • UK NCSC situates TA453 activity within broader persistent spear-phishing campaigns, highlighting long-running success rather than one-off exploitation events. (NCSC)
  • Microsoft describes evolution in at least one Mint Sandstorm subgroup from slower adoption of exploits to rapid PoC weaponisation and more complex post-exploitation playbooks. (Microsoft)

10. Future Outlook

APT35-aligned activity is likely to continue trending toward:

  • More convincing, higher-trust social engineering (multi-step engagement, use of legitimate platforms, and spoofed organisations) as documented in 2024 Proofpoint reporting. (Proofpoint)
  • Faster “blast radius” from newly disclosed edge CVEs where PoCs are published, consistent with Microsoft’s 2023 observations. (Microsoft)
  • Selective malware deployment (PowerShell-first and modular toolsets) against hardened targets where credentials alone do not meet operational objectives. (Proofpoint)

11. Further Reading

Government and national CERT guidance

Vendor and CTI reporting