A previously little-known Iranian advanced persistent threat (APT) group dubbed “BladedFeline” has been quietly operating inside high-value Middle Eastern networks for at least eight years, leveraging a multi-tool arsenal to maintain persistent access and evade detection.
Uncovered by ESET researchers in 2024 after discovering its latest malware in government systems, BladedFeline is now attributed as a sophisticated subgroup within the notorious OilRig APT umbrella.
Stealthy Multi-Stage Implants
BladedFeline’s campaigns leveraged a tailored toolset including:
Sample: Whisper config parsing & login (C# snippet):
csharp// Decoding config
string base64Config = File.ReadAllText(ConfigPath);
string xmlDecoded = Encoding.UTF8.GetString(Convert.FromBase64String(base64Config));
// Parsing credentials & logging in
var creds = GetCredentialsFromConfig(xmlDecoded);
ExchangeService service = new ExchangeService(ExchangeVersion.Exchange2010_SP2);
service.Credentials = new WebCredentials(creds.Username, creds.Password);
service.Url = new Uri(creds.Endpoint);
PrimeCache recognizes commands via Cookie headers:
textCookie: F=<command_ID>,<param>;
Actions include remote command execution, file upload/download, and exfiltration via HTTP responses.
To maintain re-entry and C2 flexibility, BladedFeline also deployed:
Timeline of Compromise
Multi-Vector Persistence
BladedFeline implements multiple persistence layers: startup entries, scheduled tasks, Windows services, and web shell implants. Timestomping techniques are frequently observed, with file creation and compile times altered to predate detection solutions’ thresholds.
Advanced Encryption and C2 Obfuscation
Its backdoors employ asymmetric/symmetric hybrid cryptography:
Each major implant supports modular, operator-defined commands ranging from custom PowerShell execution (Whisper) to command-line and file operations (PrimeCache, Shahmaran).
By decoupling command processing (especially in PrimeCache, where commands arrive over multiple requests), detection by traditional pattern-matching security tools is severely hampered.
Attribution and Impact
ESET analysis reveals strong code and operational overlaps with OilRig (APT34), especially in cryptographic routines and backdoor deployment strategies.
BladedFeline appears to focus primarily on intelligence and long-term access against diplomatic, governmental, and telecom targets emphasizing espionage over disruption.
The group’s continued development and operational security suggest substantial resources and a deep understanding of both Windows enterprise environments and Middle Eastern geopolitics.
Implications & Defensive Considerations
After nearly a decade undetected, BladedFeline’s activities underscore the evolving complexity of Iranian cyber operations—and the urgent need for deep-dive technical vigilance across all critical sectors.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…