Skip to main content

Intelligence Overview

Episode 3 exposes critical intelligence regarding the organizational structure, front companies, and key personnel behind CharmingKitten’s operations. This intelligence analysis reveals the Iranian government’s direct involvement in cyber attacks and influence operations.

MOSESS STAFF Campaign

Iranian Cyber Operations Directive

Document reference: 682089f4bd1c3e6636e15b89e967bf4fa9d7861a_#78TPDD This intelligence reveals the Iranian directive reflected in the campaign’s activity, which includes Iranian involvement in cyber attacks and public influence platforms such as MOSESS STAFF.

MOSESS STAFF Platform

MOSESS STAFF represents an Iranian cyber attack and influence campaign that demonstrates:
  • Coordinated cyber operations - Integration of technical attacks with information operations
  • Government-directed activity - Direct IRGC-IO oversight and tasking
  • Multi-domain targeting - Combined cyberattacks and public messaging
MOSESS STAFF is part of a broader Iranian strategy combining technical network intrusions with public disclosure and propaganda operations.

Front Company: JARF/ZHARF ANDISHAN TAFACOR SEFID

Company Identification

Document reference: 5e98006a2cf1c15a164279558eed4a15018e34a0_بسمه تعالی Company Name (Persian): ژرف انديشان تفكر سفيد
Transliteration: JARF/ZHARF ANDISHAN TAFACOR SEFID
Translation: “Deep Thinkers of White Thought” or “Profound Contemplation of Pure Thought”

Organizational Structure

The exposed document reveals the formal organizational structure connecting the front company to IRGC-IO operations: Document Characteristics:
  • Official company letterhead with “بسمه تعالی” (In the name of the Exalted/God) - common Iranian government format
  • Signed by company director who is simultaneously an IRGC-IO official
  • References personnel assignments within the APT structure

Purpose of Front Company

JARF/ZHARF ANDISHAN TAFACOR SEFID serves as:
  1. Legal Cover - Provides legitimate business registration for operational infrastructure
  2. Financial Channel - Enables banking and payment processing for operations
  3. Personnel Cover - Provides employment cover story for APT operatives
  4. Infrastructure Procurement - Registers servers, domains, and services
This front company structure is similar to other Iranian APT operations where government cyber units operate behind civilian business facades.

Key Personnel

MANOOCHEHR VOSOUGHI NIRI

Name (Persian): منوچهر وثوقی نیری
Transliteration: Manoochehr Vosoughi Niri
Role: Company Director & IRGC-IO Official

Dual Role

VOSOUGHI NIRI holds simultaneous positions:
  1. Director of JARF/ZHARF ANDISHAN TAFACOR SEFID - Civilian front company
  2. IRGC-IO Official - Intelligence Organization operative
This dual role is evidenced by:
  • Official document signature
  • Authority to assign APT personnel
  • Direct involvement in operational documentation

Operational Authority

The exposed documents show VOSOUGHI NIRI has:
  • Personnel assignment authority
  • Operational oversight
  • Documentation approval powers
  • Direct reporting relationship to IRGC-IO chain of command

MOHAMMAD ERFAN HAMIDI AREF

Name (Persian): محمد عرفان حمیدی عارف
Transliteration: Mohammad Erfan Hamidi Aref
National ID: 0023199709
Role: APT Operative / Infrastructure Manager

Identified Roles

MOHAMMD ERFAN HAMIDI AREF has been identified in multiple documents: Episode 3 Documents:
  • Listed as employee within the APT structure
  • Referenced in front company organizational documents
  • Connected to operational activities
Episode 4 Reference (Cross-Episode Intelligence):
  • Took over infrastructure management role from MOHAMMAD NAJAFLOO
  • Maintained Excel sheets documenting unified infrastructure
  • Managed server procurement and access credentials

Infrastructure Management

As revealed in Episode 4, HAMIDI AREF managed:
  • Server credentials - Login details for operational infrastructure
  • Procurement identities - Accounts used to acquire servers
  • Attack servers - Tunnel and operational systems
  • Storage servers - File extraction and storage systems

Operational Continuity

HAMIDI AREF’s role demonstrates operational continuity:
  • Succeeded previous infrastructure manager (NAJAFLOO, ID: 4270878835)
  • Continued maintaining infrastructure documentation
  • Represents younger generation of IRGC-IO cyber operatives

Connection to Abbas Rahrovi

Leadership Structure

The intelligence confirms Abbas Rahrovi (aka Abbas Hosseini, National ID: 4270844116) maintains overall leadership:
  • Direct Management - Oversees front company operations
  • Asset Control - Manages infrastructure and personnel
  • Campaign Direction - Directs malicious activity against international targets

Operational Security Failure

The intelligence notes that:
“Abbas Rahrovi is leading the campaign’s activity, assets, and malicious activity against international targets. Abbas is a ‘shadow man’, but the campaign he has set up has now been exposed, and is very embarrassing for the Iranian leadership.”
The exposure of:
  • Front company structure
  • Key personnel identities
  • Organizational relationships
Represents a catastrophic operational security failure for IRGC-IO’s counterintelligence division.

Organizational Chart

Based on exposed intelligence:
IRGC-IO (Intelligence Organization)
    |
    └── Counterintelligence Division (Unit 1500)
            |
            └── Department 40 (CharmingKitten)
                    |
                    ├── Abbas Rahrovi (Overall Leader)
                    |
                    ├── JARF/ZHARF ANDISHAN TAFACOR SEFID (Front Company)
                    │       |
                    │       └── Manoochehr Vosoughi Niri (Director/IRGC Official)
                    |
                    └── Operations Personnel
                            |
                            ├── Mohammad Erfan Hamidi Aref (Infrastructure Manager)
                            ├── Mohammad Najafloo (Former Infrastructure Manager)
                            ├── Vahid Molawi (Attacker - Karaj team)
                            └── Additional operatives

Multi-Episode Intelligence Correlation

Cross-Episode Personnel Tracking

MOHAMMAD ERFAN HAMIDI AREF appears in multiple episodes:
  • Episode 3 - Identified in front company documents
  • Episode 4 - Revealed as infrastructure manager with extensive access
This cross-episode appearance confirms:
  • Central role in operations
  • Long-term involvement
  • Access to critical infrastructure

Intelligence Building

The episode-by-episode releases build a comprehensive intelligence picture: Episode 1:
  • Leadership (Abbas Rahrovi)
  • Overall structure and targeting
Episode 2:
  • Attack reports and victims
  • Additional personnel (Vahid Molawi)
  • Server infrastructure
Episode 3:
  • Malware source code
  • Front companies
  • Additional personnel (Vosoughi Niri, Hamidi Aref)
  • Technical capabilities
Episode 4:
  • Complete infrastructure mapping
  • Detailed personnel roles
  • Passwords and access credentials

Training and Technical Documentation

The intelligence documents include:

Training Programs

  • Malware development training
  • Anti-virus evasion techniques
  • Target reconnaissance methods
  • Operational security procedures (now proven inadequate)

Technical Intelligence Reports

Focus areas documented:
  • Israeli Entity Targeting - Multiple reports on Israeli-related intelligence
  • Regional Intelligence - Middle East and Gulf states
  • Technology Analysis - Security products and bypass methods

Espionage Operations

Documented espionage activities:
  • Government entity targeting
  • Telecommunications companies
  • Aviation companies (FlyDubai)
  • Intelligence organizations

Implications for Iranian Leadership

The exposure creates significant challenges for Iranian leadership:

Political Embarrassment

  • International Exposure - Personnel identities now public
  • Front Company Revealed - Cover structure compromised
  • Capability Assessment - Technical capabilities fully documented

Operational Impact

  • Personnel Burned - Named individuals can no longer operate covertly
  • Infrastructure Compromised - Servers and domains exposed
  • TTPs Documented - Techniques available for defensive measures

Attribution Certainty

The intelligence provides unambiguous attribution:
  • Official IRGC-IO documents
  • Personnel with dual government/company roles
  • Direct chain of command documentation
  • Signed documents from officials

Intelligence Assessment

Reliability: HIGH

Source Material:
  • Official company documents with signatures
  • Internal technical documentation
  • Personnel records with national IDs
  • Infrastructure credentials and access logs

Impact: CRITICAL

Consequences:
  • Complete exposure of operational cell
  • Front company structure revealed
  • Key personnel identified
  • Technical capabilities documented

Significance: UNPRECEDENTED

This represents one of the most comprehensive exposures of an Iranian APT operation, including:
  • Complete source code of operational malware
  • Organizational structure documentation
  • Personnel identification with national IDs
  • Front company legal structure
  • Technical training materials
  • Victim targeting evidence
The intelligence value of this exposure extends beyond CharmingKitten to provide insights into broader IRGC-IO cyber operations structure and methodology.
Based on this intelligence:

For Security Researchers

  1. Cross-reference personnel - Check VOSOUGHI NIRI and HAMIDI AREF against other data sources
  2. Front company investigation - Search for JARF/ZHARF ANDISHAN TAFACOR SEFID in business registries
  3. Infrastructure mapping - Identify additional infrastructure linked to these personnel

For Defenders

  1. Threat hunting - Use IOCs and TTPs from technical analysis
  2. Personnel monitoring - Watch for these individuals in other contexts
  3. Infrastructure tracking - Monitor for new infrastructure registration by exposed entities

For Intelligence Community

  1. Network analysis - Map additional connections from exposed personnel
  2. Financial tracking - Follow financial flows through front company
  3. Capability assessment - Update Iranian APT capability estimates based on malware analysis

Episode 3 Overview

Return to Episode 3 main page

BellaCiao Malware

Technical malware analysis

Webshells Framework

Python & webshells technical details

Episode 4: Infrastructure

Complete infrastructure exposure

Build docs developers (and LLMs) love