A new joint cybersecurity advisory from the Federal Bureau of Investigation, the Cybersecurity and Infrastructure Security Agency, and the Department of Defense Cyber Crime Center exposed new information about the infamous Iran-based threat actor known as Fox Kitten.

The group sells the corporate access they obtain in cybercriminal’s underground forums and collaborates actively with ransomware affiliates to assist in ransoming victims. The threat actor has set their sights on infiltrating the U.S. and other foreign organizations in recent weeks.

Who is Fox Kitten?

Fox Kitten — also known as Pioneer Kitten, UNC757, Parasite, Rubidium, and Lemon Sandworm — is a threat actor that has actively committed cyberespionage since at least 2017.

The FBI said that the group is associated with the Iranian government and supports the theft of sensitive technical data against various organizations, per the advisory. The threat actor has targeted companies in the middle-east such as Israel and Azerbaijan, but also companies in Australia, Finland, Ireland, France, Germany, Algeria, Turkey, the U.S., and possibly more.

According to the advisory, Fox Kitten has conducted a high volume of computer network intrusion attempts against U.S. organizations since 2017. Their targets have included U.S.-based schools, municipal governments, financial institutions, and healthcare facilities, with incidents as recent as August 2024.

OT cybersecurity company Dragos noted that the threat actor also targeted ICS-related entities by exploiting vulnerabilities in Virtual Private Network appliances.

The advisory also revealed that the group uses “the Iranian company name Danesh Novin Sahand (identification number 14007585836), likely as a cover IT entity for the group’s malicious cyber activities.”

More than just cyberespionage

In 2020, operation “Pay2Key,” led by Fox Kitten, showed that the threat actor could follow other goals rather than just facilitating cyberespionage.

According to Israeli-based company ClearSky Cyber Security, ransomware attacks targeted Israeli organizations with previously unreported ransomware, yet the attack campaign was likely propaganda to cause fear and create panic in Israel. Data stolen during the attacks was exposed publicly on a leak site that mentioned “Pay2Key, Israel cyberspace nightmare!” as shown in the report.

Another report, published by cybersecurity company CrowdStrike in 2020, revealed that the threat actor also advertised to sell access to compromised networks on an underground forum. Researchers consider this activity as a potential attempt at revenue stream diversification, alongside the targeted intrusions in support of the Iranian government.

Collaboration with ransomware affiliates

Once Fox Kitten has obtained access to victim networks, the group collaborates with a few ransomware affiliates from the NoEscape, RansomHouse, and ALPHV/BlackCat. The threat actor provides full access to ransomware affiliates in exchange for a percentage of the ransom payments.

Fox Kitten provides more than just access to compromised networks, according to the FBI. The group works closely with the ransomware affiliates to lock victim networks and strategize approaches to extort victims. Yet the group does not reveal its Iran-based location to their ransomware affiliate contacts and stays vague as to their origin.

The joint advisory reveals that the group refers to themselves by the moniker “Br0k3r” and has used “xplfinder” in their channels in 2024.

Technical details

Fox Kitten uses the Shodan search engine to identify IP addresses hosting devices vulnerable to specific exploits, such as Citrix Netscaler, F5 Big-IP, Pulse Secure/Ivanti VPNs, or PanOS firewalls.

Once the vulnerabilities are exploited, the threat actor:

  • Plants webshells and captures login credentials before creating malicious tasks to add backdoor malware and continue compromising the system.
  • Uses compromised credentials to create new accounts on victims’ networks using discreet names such as “IIS_Admin” or “sqladmin$.”
  • Gains control of admin credentials to log into domain controllers and other parts of the infrastructure. Existing security software and antivirus are also disabled.

‘Br0k3r’ has been active for more than a year

The joint advisory provides several indicators of compromise but also lists the TOX identifiers for the moniker “Br0k3r.” TOX is a peer-to-peer instant messaging software designed to provide secure communications and uses unique keys to identify users.

The unique TOX ID for “Br0k3r” has already been exposed in 2023 by the SANS Institute as an Initial Access Broker selling access to corporate networks in different countries, including the U.S., Canada, China, the U.K., France, Italy, Norway, Spain, India, Taiwan, and Switzerland.

Threat actor Br0k3r offers access to corporate networks and mentions possible cooperation on an underground forum.
Threat actor Br0k3r offers access to corporate networks and mentions possible cooperation on an underground forum. Image: SANS Institute

It is no surprise to see the threat actor target the U.S., as it is the most ransomware-impacted country according to cybersecurity company MalwareBytes.

Leveraging cybercriminal forums

The threat actor provided a unique Tor-hosted website to advertise their access on several different cybercriminal’s forums.

A first version of Br0k3r’s website indicates that every sale contains full-domain control, including domain admin credentials, Active Directory user credentials, DNS zones and objects, and Windows Domain trusts.

First version of Br0k3r’s Tor-hosted website.
First version of Br0k3r’s Tor-hosted website. Image: SANS Institute

A second version of the website launched around August 2023 indicates “Numerous active ransomware gangs working with me in a fair percentage.”

Second version of Br0k3r’s Tor-hosted website.
Second version of Br0k3r’s Tor-hosted website. Image: SANS Institute

How to protect your business from this threat

The initial compromise method deployed by Fox Kitten consists of exploiting known vulnerabilities in several different Internet-facing appliances, in particular corporate VPNs or firewall appliances. To protect from this cyber threat, companies should:

  • Update and patch VPN and firewall appliances to avoid falling for such vulnerabilities.
  • Update and patch all operating systems, and software must be up-to-date and patched.
  • Monitor who has access to VPNs for any suspicious connection or connection attempt. Filtering on the VPN appliances should also be used, so employees can only connect from their usual Internet connection when necessary.
  • Check and analyze log files. Any discovery of an indicator of compromise provided in the joint report must lead to immediate investigation.
  • Deploy security solutions on every endpoint and server in order to detect suspicious activity.

Finally, the FBI and the CISA do not recommend paying the ransom, as there is no guarantee that victims will recover their encrypted files, and those payments might also fund other criminal activities.

Disclosure: I work for Trend Micro, but the views expressed in this article are mine.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday