Threat Actor Profile
High APT
Description

Magic Hound is an Iranian-sponsored threat group that conducts long term, resource-intensive cyber espionage operations, likely on behalf of the Islamic Revolutionary Guard Corps. They have targeted European, U.S., and Middle Eastern government and military personnel, academics, journalists, and organizations such as the World Health Organization (WHO), via complex social engineering campaigns since at least 2014.(Citation: FireEye APT35 2018)(Citation: ClearSky Kittens Back 3 August 2020)(Citation: Certfa Charming Kitten January 2021)(Citation: Secureworks COBALT ILLUSION Threat Profile)(Citation: Proofpoint TA453 July2021)

Confidence Score
90%
Known Aliases
Magic Hound TA453 COBALT ILLUSION Charming Kitten ITG18 Phosphorus Newscaster APT35 Mint Sandstorm
Tags
mitre-attack stix-2.1 intrusion-set
First Seen

Unknown

Last Updated

Unknown

Active Status
Active
Created

April 29, 2026

MITRE ATT&CK Techniques (79)
T1005 - Data from Local System
Collection
T1056.001 - Keylogging
Collection
T1113 - Screen Capture
Collection
T1114 - Email Collection
Collection
T1114.001 - Local Email Collection
Collection
T1114.002 - Remote Email Collection
Collection
T1560.001 - Archive via Utility
Collection
T1071 - Application Layer Protocol
Command and Control
T1071.001 - Web Protocols
Command and Control
T1090 - Proxy
Command and Control
T1102.002 - Bidirectional Communication
Command and Control
T1105 - Ingress Tool Transfer
Command and Control
T1571 - Non-Standard Port
Command and Control
T1572 - Protocol Tunneling
Command and Control
T1573 - Encrypted Channel
Command and Control
T1003.001 - LSASS Memory
Credential Access
T1027.010 - Command Obfuscation
Defense Evasion
T1027.013 - Encrypted/Encoded File
Defense Evasion
T1036.004 - Masquerade Task or Service
Defense Evasion
T1036.005 - Match Legitimate Resource Name or Locat…
Defense Evasion
T1036.010 - Masquerade Account Name
Defense Evasion
T1070.003 - Clear Command History
Defense Evasion
T1070.004 - File Deletion
Defense Evasion
T1078.001 - Default Accounts
Defense Evasion
T1078.002 - Domain Accounts
Defense Evasion
T1112 - Modify Registry
Defense Evasion
T1218.011 - Rundll32
Defense Evasion
T1562 - Impair Defenses
Defense Evasion
T1562.001 - Disable or Modify Tools
Defense Evasion
T1562.002 - Disable Windows Event Logging
Defense Evasion
T1562.004 - Disable or Modify System Firewall
Defense Evasion
T1564.003 - Hidden Window
Defense Evasion
T1016 - System Network Configuration Discovery
Discovery
T1016.001 - Internet Connection Discovery
Discovery
T1016.002 - Wi-Fi Discovery
Discovery
T1018 - Remote System Discovery
Discovery
T1033 - System Owner/User Discovery
Discovery
T1046 - Network Service Discovery
Discovery
T1049 - System Network Connections Discovery
Discovery
T1057 - Process Discovery
Discovery
T1082 - System Information Discovery
Discovery
T1083 - File and Directory Discovery
Discovery
T1087.003 - Email Account
Discovery
T1482 - Domain Trust Discovery
Discovery
T1047 - Windows Management Instrumentation
Execution
T1053.005 - Scheduled Task
Execution
T1059.001 - PowerShell
Execution
T1059.003 - Windows Command Shell
Execution
T1059.005 - Visual Basic
Execution
T1204.001 - Malicious Link
Execution
T1204.002 - Malicious File
Execution
T1567 - Exfiltration Over Web Service
Exfiltration
T1486 - Data Encrypted for Impact
Impact
T1189 - Drive-by Compromise
Initial Access
T1190 - Exploit Public-Facing Application
Initial Access
T1566.002 - Spearphishing Link
Initial Access
T1566.003 - Spearphishing via Service
Initial Access
T1021.001 - Remote Desktop Protocol
Lateral Movement
T1570 - Lateral Tool Transfer
Lateral Movement
T1098.002 - Additional Email Delegate Permissions
Persistence
T1098.007 - Additional Local or Domain Groups
Persistence
T1136.001 - Local Account
Persistence
T1505.003 - Web Shell
Persistence
T1547.001 - Registry Run Keys / Startup Folder
Persistence
T1589 - Gather Victim Identity Information
Reconnaissance
T1589.001 - Credentials
Reconnaissance
T1589.002 - Email Addresses
Reconnaissance
T1590.005 - IP Addresses
Reconnaissance
T1591.001 - Determine Physical Locations
Reconnaissance
T1592.002 - Software
Reconnaissance
T1595.002 - Vulnerability Scanning
Reconnaissance
T1598.003 - Spearphishing Link
Reconnaissance
T1583.001 - Domains
Resource Development
T1583.006 - Web Services
Resource Development
T1584.001 - Domains
Resource Development
T1585.001 - Social Media Accounts
Resource Development
T1585.002 - Email Accounts
Resource Development
T1586.002 - Email Accounts
Resource Development
T1588.002 - Tool
Resource Development
Indicators of Compromise

Loading IOCs…

IOC KQL for Sentinel
STIX Data
{'aliases': ['Magic Hound',
             'TA453',
             'COBALT ILLUSION',
             'Charming Kitten',
             'ITG18',
             'Phosphorus',
             'Newscaster',
             'APT35',
             'Mint Sandstorm'],
 'created': '2018-01-16T16:13:52.465Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': '[Magic Hound](https://attack.mitre.org/groups/G0059) is an '
                'Iranian-sponsored threat group that conducts long term, '
                'resource-intensive cyber espionage operations, likely on '
                'behalf of the Islamic Revolutionary Guard Corps. They have '
                'targeted European, U.S., and Middle Eastern government and '
                'military personnel, academics, journalists, and organizations '
                'such as the World Health Organization (WHO), via complex '
                'social engineering campaigns since at least 2014.(Citation: '
                'FireEye APT35 2018)(Citation: ClearSky Kittens Back 3 August '
                '2020)(Citation: Certfa Charming Kitten January '
                '2021)(Citation: Secureworks COBALT ILLUSION Threat '
                'Profile)(Citation: Proofpoint TA453 July2021)',
 'external_references': [{'external_id': 'G0059',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/groups/G0059'},
                         {'description': '(Citation: ClearSky Charming Kitten '
                                         'Dec 2017)(Citation: Eweek Newscaster '
                                         'and Charming Kitten May '
                                         '2014)(Citation: ClearSky Kittens '
                                         'Back 2 Oct 2019)(Citation: ClearSky '
                                         'Kittens Back 3 August '
                                         '2020)(Citation: Proofpoint TA453 '
                                         'March 2021)(Citation: Check Point '
                                         'APT35 CharmPower January 2022)',
                          'source_name': 'Charming Kitten'},
                         {'description': '(Citation: FireEye APT35 '
                                         '2018)(Citation: Certfa Charming '
                                         'Kitten January 2021)(Citation: Check '
                                         'Point APT35 CharmPower January 2022)',
                          'source_name': 'APT35'},
                         {'description': '(Citation: IBM ITG18 2020)',
                          'source_name': 'ITG18'},
                         {'description': '(Citation: Microsoft Phosphorus Mar '
                                         '2019)(Citation: Microsoft Phosphorus '
                                         'Oct 2020)(Citation: US District '
                                         'Court of DC Phosphorus Complaint '
                                         '2019)(Citation: Certfa Charming '
                                         'Kitten January 2021)(Citation: '
                                         'Proofpoint TA453 March '
                                         '2021)(Citation: Check Point APT35 '
                                         'CharmPower January 2022)',
                          'source_name': 'Phosphorus'},
                         {'description': '(Citation: Microsoft Threat Actor '
                                         'Naming July 2023)',
                          'source_name': 'Mint Sandstorm'},
                         {'description': '(Citation: Proofpoint TA453 March '
                                         '2021)(Citation: Proofpoint TA453 '
                                         'July2021)(Citation: Check Point '
                                         'APT35 CharmPower January 2022)',
                          'source_name': 'TA453'},
                         {'description': '(Citation: Secureworks COBALT '
                                         'ILLUSION Threat Profile)',
                          'source_name': 'COBALT ILLUSION'},
                         {'description': '(Citation: Unit 42 Magic Hound Feb '
                                         '2017)',
                          'source_name': 'Magic Hound'},
                         {'description': 'Burt, T. (2019, March 27). New steps '
                                         'to protect customers from hacking. '
                                         'Retrieved May 27, 2020.',
                          'source_name': 'Microsoft Phosphorus Mar 2019',
                          'url': 'https://blogs.microsoft.com/on-the-issues/2019/03/27/new-steps-to-protect-customers-from-hacking/'},
                         {'description': 'Burt, T. (2020, October 28). '
                                         'Cyberattacks target international '
                                         'conference attendees. Retrieved '
                                         'March 8, 2021.',
                          'source_name': 'Microsoft Phosphorus Oct 2020',
                          'url': 'https://blogs.microsoft.com/on-the-issues/2020/10/28/cyberattacks-phosphorus-t20-munich-security-conference/'},
                         {'description': 'Certfa Labs. (2021, January 8). '
                                         'Charming Kitten’s Christmas Gift. '
                                         'Retrieved May 3, 2021.',
                          'source_name': 'Certfa Charming Kitten January 2021',
                          'url': 'https://blog.certfa.com/posts/charming-kitten-christmas-gift/'},
                         {'description': 'Check Point. (2022, January 11). '
                                         'APT35 exploits Log4j vulnerability '
                                         'to distribute new modular PowerShell '
                                         'toolkit. Retrieved January 24, 2022.',
                          'source_name': 'Check Point APT35 CharmPower January '
                                         '2022',
                          'url': 'https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit/'},
                         {'description': 'ClearSky Cyber Security. (2017, '
                                         'December). Charming Kitten. '
                                         'Retrieved December 27, 2017.',
                          'source_name': 'ClearSky Charming Kitten Dec 2017',
                          'url': 'http://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdf'},
                         {'description': 'ClearSky Research Team. (2019, '
                                         'October 1). The Kittens Are Back in '
                                         'Town2 - Charming Kitten Campaign '
                                         'KeepsGoing on, Using New '
                                         'Impersonation Methods. Retrieved '
                                         'April 21, 2021.',
                          'source_name': 'ClearSky Kittens Back 2 Oct 2019',
                          'url': 'https://www.clearskysec.com/wp-content/uploads/2019/10/The-Kittens-Are-Back-in-Town-2-1.pdf'},
                         {'description': 'ClearSky Research Team. (2020, '
                                         'August 1). The Kittens Are Back in '
                                         'Town 3 - Charming Kitten Campaign '
                                         'Evolved and Deploying Spear-Phishing '
                                         'link by WhatsApp. Retrieved April '
                                         '21, 2021.',
                          'source_name': 'ClearSky Kittens Back 3 August 2020',
                          'url': 'https://www.clearskysec.com/wp-content/uploads/2020/08/The-Kittens-are-Back-in-Town-3.pdf'},
                         {'description': 'Kerner, S. (2014, May 29). '
                                         'Newscaster Threat Uses Social Media '
                                         'for Intelligence Gathering. '
                                         'Retrieved April 14, 2021.',
                          'source_name': 'Eweek Newscaster and Charming Kitten '
                                         'May 2014',
                          'url': 'https://www.eweek.com/security/newscaster-threat-uses-social-media-for-intelligence-gathering'},
                         {'description': 'Lee, B. and Falcone, R. (2017, '
                                         'February 15). Magic Hound Campaign '
                                         'Attacks Saudi Targets. Retrieved '
                                         'December 27, 2017.',
                          'source_name': 'Unit 42 Magic Hound Feb 2017',
                          'url': 'https://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/'},
                         {'description': 'Link analysis of infrastructure and '
                                         'tools revealed a potential '
                                         'relationship between Magic Hound and '
                                         'the older attack campaign called '
                                         'Newscaster (aka '
                                         'Newscasters).(Citation: Unit 42 '
                                         'Magic Hound Feb 2017)(Citation: '
                                         'FireEye APT35 2018)',
                          'source_name': 'Newscaster'},
                         {'description': 'Mandiant. (2018). Mandiant M-Trends '
                                         '2018. Retrieved November 17, 2024.',
                          'source_name': 'FireEye APT35 2018',
                          'url': 'https://static.carahsoft.com/concrete/files/1015/2779/3571/M-Trends-2018-Report.pdf'},
                         {'description': 'Microsoft . (2023, July 12). How '
                                         'Microsoft names threat actors. '
                                         'Retrieved November 17, 2023.',
                          'source_name': 'Microsoft Threat Actor Naming July '
                                         '2023',
                          'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'},
                         {'description': 'Miller, J. et al. (2021, July 13). '
                                         'Operation SpoofedScholars: A '
                                         'Conversation with TA453. Retrieved '
                                         'August 18, 2021.',
                          'source_name': 'Proofpoint TA453 July2021',
                          'url': 'https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453'},
                         {'description': 'Miller, J. et al. (2021, March 30). '
                                         'BadBlood: TA453 Targets US and '
                                         'Israeli Medical Research Personnel '
                                         'in Credential Phishing Campaigns. '
                                         'Retrieved May 4, 2021.',
                          'source_name': 'Proofpoint TA453 March 2021',
                          'url': 'https://www.proofpoint.com/us/blog/threat-insight/badblood-ta453-targets-us-and-israeli-medical-research-personnel-credential'},
                         {'description': 'Secureworks. (n.d.). COBALT ILLUSION '
                                         'Threat Profile. Retrieved April 14, '
                                         '2021.',
                          'source_name': 'Secureworks COBALT ILLUSION Threat '
                                         'Profile',
                          'url': 'https://www.secureworks.com/research/threat-profiles/cobalt-illusion'},
                         {'description': 'US District Court of DC. (2019, '
                                         'March 14). MICROSOFT CORPORATION v. '
                                         'JOHN DOES 1-2, CONTROLLING A '
                                         'COMPUTER NETWORK AND THEREBY '
                                         'INJURING PLAINTIFF AND ITS '
                                         'CUSTOMERS. Retrieved March 8, 2021.',
                          'source_name': 'US District Court of DC Phosphorus '
                                         'Complaint 2019',
                          'url': 'https://noticeofpleadings.com/phosphorus/files/Complaint.pdf'},
                         {'description': 'Wikoff, A. Emerson, R. (2020, July '
                                         '16). New Research Exposes Iranian '
                                         'Threat Group Operations. Retrieved '
                                         'March 8, 2021.',
                          'source_name': 'IBM ITG18 2020',
                          'url': 'https://securityintelligence.com/posts/new-research-exposes-iranian-threat-group-operations/'}],
 'id': 'intrusion-set--f9d6633a-55e6-4adc-9263-6ae080421a13',
 'modified': '2024-11-17T16:17:26.385Z',
 'name': 'Magic Hound',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'intrusion-set',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Anastasios Pingios',
                          'Bryan Lee',
                          'Daniyal Naeem, BT Security'],
 'x_mitre_deprecated': False,
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_version': '6.1'}
Quick Actions
Related TTPs (79)
Data from Local System
Collection

Keylogging
Collection

Screen Capture
Collection

Email Collection
Collection

Local Email Collection
Collection