2026-03-20 | APT Groups and Nation-State Actors | Oracle-42 Intelligence Research
```html

Iranian APT Groups: MuddyWater and Charming Kitten Tactics, Techniques, and Procedures (TTPs) in 2025

Executive Summary: Iranian state-sponsored advanced persistent threat (APT) groups MuddyWater and Charming Kitten have evolved their Tactics, Techniques, and Procedures (TTPs) to exploit modern authentication infrastructures, bypass multi-factor authentication (MFA), and evade detection through sophisticated social engineering and fileless attack methodologies. Leveraging tools such as Evilginx, these groups demonstrate increased operational resilience and adaptability in targeting government, defense, and critical infrastructure sectors. This analysis examines their current operational patterns, highlights key attack vectors, and provides strategic recommendations for defense and mitigation.

Key Findings

Evolution of Attack Infrastructure: The Rise of Evilginx and AiTM

In 2025, Iranian APT groups have increasingly adopted Evilginx, an open-source man-in-the-middle (MitM) toolkit, to intercept credentials and session tokens during login processes. Unlike traditional phishing, which relies on credential harvesting, Evilginx enables threat actors to bypass MFA by capturing session cookies directly from legitimate authentication flows.

This technique is particularly effective against organizations using SSO solutions such as Microsoft Entra ID (formerly Azure AD), Okta, or Google Workspace. By hosting a cloned login page on a domain resembling the target organization’s SSO portal (e.g., login.corp-company.com), attackers trick users into entering their credentials and MFA codes, which are then relayed in real time to the legitimate service. The victim, believing authentication succeeded, proceeds normally—while the attacker gains persistent access.

Tactics, Techniques, and Procedures (TTPs) of MuddyWater and Charming Kitten

MuddyWater: Operational Agility and Rapid Tooling

MuddyWater, linked to Iran’s Ministry of Intelligence and Security (MOIS), has demonstrated a high degree of operational agility. Recent campaigns reveal:

Charming Kitten: Precision Targeting and Geopolitical Alignment

Charming Kitten (also known as APT35 or Phosphorus), attributed to the Islamic Revolutionary Guard Corps (IRGC), has refined its targeting to align with Iran’s strategic interests. Observed behaviors include:

Evasion and Detection Challenges

The integration of Evilginx into MuddyWater and Charming Kitten operations presents unique detection challenges:

To counter this, organizations must adopt a defense-in-depth strategy that includes:

Geopolitical Context and Campaign Timing

Recent reporting indicates that Iranian APT operations are increasingly synchronized with international events. For example, campaigns targeting Ukrainian government entities coincided with NATO summits, suggesting a strategy to influence diplomatic outcomes or gather intelligence on allied responses. Similarly, MuddyWater has been observed targeting Middle Eastern governments and NGOs during periods of heightened regional tension.

This pattern underscores the need for threat intelligence teams to correlate operational timelines with geopolitical developments to anticipate and preempt attacks.

Recommendations for Defenders

To mitigate risks from MuddyWater, Charming Kitten, and similar APT groups using advanced AiTM techniques, organizations should implement the following controls:

Technical Controls

Process and Governance

Conclusion

MuddyWater and Charming Kitten represent a persistent and evolving threat from Iran, leveraging modern authentication bypasses and fileless techniques to maintain operational effectiveness. The adoption of Evilginx-based AiTM attacks signifies a shift toward more sophisticated, harder-to-detect intrusion methods. Organizations must move beyond traditional perimeter defenses and adopt a zero-trust architecture grounded in phishing-resistant authentication, continuous monitoring, and rapid incident response.

In the face of geopolitically motivated cyber operations, proactive threat hunting and intelligence-driven defense are essential to detect and deter these adversaries before they achieve their objectives.

FAQ

What is Evilginx and why is it so effective against MFA?

Evilginx is an open-source man-in-the-middle framework that intercepts user credentials and session tokens during login. It is effective against MFA because it captures not just the password, but also the second factor (e.g., SMS code or TOTP token) in real time, relaying it to the legitimate service. The user remains unaware, as they see a successful login message.© 2026 Oracle-42 | 94,000+ intelligence data points | Privacy | Terms