Personnel: Infrastructure Managers
This page exposes the identities of two key IRGC operatives responsible for maintaining CharmingKitten’s critical infrastructure documentation.Overview
The unified infrastructure Excel sheets exposed in this episode were maintained by two individuals who served as infrastructure managers for the CharmingKitten APT group. These operatives had access to all server credentials, procurement identities, and operational infrastructure details.MOHAMMAD NAJAFLOO
Identity Information
Full Name: MOHAMMAD NAJAFLOONational ID:
4270878835Role: Senior Infrastructure Manager
Status: Former employee
Tenure: Multi-year infrastructure management role
Responsibilities
Mohammad Najafloo served as a senior employee within CharmingKitten’s operational structure and was responsible for:- Infrastructure documentation - Creating and maintaining the unified Excel sheets
- Credential management - Documenting all server login credentials and procurement accounts
- Service tracking - Recording domain registrations, hosting services, and renewal dates
- Financial tracking - Documenting payment methods and cryptocurrency transactions
- Operational continuity - Ensuring infrastructure information was preserved for future operations
Documented Infrastructure
During his tenure, Najafloo maintained documentation for:- Hundreds of operational domains across multiple TLDs
- Server credentials for attack infrastructure, tunnel servers, and storage systems
- Procurement identities including email accounts and fake personas
- Service provider accounts with hosting companies and domain registrars
- Payment records including Bitcoin wallet addresses and transaction details
- Internal system access for communication platforms (ISABELLE, 3CX, SIGNAL)
Operational Security Impact
Najafloo’s role meant he had:- Complete visibility into all CharmingKitten infrastructure
- Root access credentials to critical operational servers
- Knowledge of procurement methods and operational security procedures
- Access to financial information about group operations
- Understanding of campaign structure through infrastructure organization
Professional Background
While specific employment details are limited, Najafloo’s role suggests:- Technical expertise in infrastructure management and system administration
- Trusted position within the IRGC Counterintelligence Division (Unit 1500)
- Long-term involvement with CharmingKitten operations
- Direct reporting to senior IRGC-IO officials
MOHAMMADERFAN HAMIDIAREF
Identity Information
Full Name: MOHAMMADERFAN HAMIDIAREFAlso Known As: MOHAMMAD ERFAN HAMIDI AREF
Persian: محمد عرفان حمیدی عارف
National ID:
0023199709Role: Infrastructure Manager
Status: Active (at time of exposure)
Previous Mention: Episode 3 documentation
Transition and Continuity
Hamidiaref took over infrastructure management responsibilities after Najafloo’s departure:- Assumed documentation role - Continued maintaining the unified infrastructure sheets
- Inherited access - Given credentials to all existing infrastructure
- Expanded operations - Added new infrastructure as operations scaled
- Maintained continuity - Ensured no disruption to operational capabilities
Previous Exposure
Hamidiaref was previously identified in Episode 3 documentation:- Mentioned in official IRGC documents
- Linked to the front company JARF/ZHARF ANDISHAN TAFACOR SEFID (ژرف انديشان تفكر سفيد)
- Documents signed by IRGC-IO official MANOOCHEHR VOSOUGHI NIRI (منوچهر وثوقی نیری)
- Established connection to the CharmingKitten APT operations
Responsibilities
As the successor to Najafloo, Hamidiaref’s responsibilities included:- Updating infrastructure sheets - Adding new servers, domains, and credentials
- Managing renewals - Tracking service expiration dates and renewal requirements
- Procurement coordination - Registering new services and managing procurement identities
- Credential rotation - Updating passwords and access credentials
- Infrastructure expansion - Documenting new operational capabilities
Documented Operations
Hamidiaref maintained documentation for key operations including:Moses Staff Campaign
- Multiple domain registrations (.io, .to, .se)
- TOR hosting infrastructure
- Server credentials and IP assignments
- DNS management through CloudNS
- SSL certificates and email accounts
Israel-Targeted Operations
- israel-talent.com and israel-talent.xyz domains
- Dedicated phishing infrastructure
- TheOnionHost hosting services
- ProtonMail accounts for procurement
Abrahams Ax Operation
- PRQ.se domain registration
- Impreza hosting infrastructure
- Server credentials and control panel access
- TOR and clearnet hosting coordination
Phishing Infrastructure
- Job-themed phishing domains
- Arabic-language operations (wazayif-halima.org)
- Multi-language targeting capabilities
- Email harvesting systems
Technical Capabilities
Hamidiaref’s role demonstrates:- Infrastructure expertise - Managing complex multi-server operations
- Operational security knowledge - Understanding of anonymity and privacy services
- Financial management - Handling cryptocurrency payments and service billing
- Multi-campaign coordination - Supporting various simultaneous operations
- Documentation discipline - Maintaining detailed records for operational continuity
Organizational Position
Hamidiaref’s position indicates:- Trusted operative within Department 40 of Unit 1500
- Direct access to senior leadership including Abbas Rahrovi
- Critical role in maintaining operational capabilities
- Knowledge of multiple campaigns across different targets and regions
Operational Impact of Exposure
The exposure of both Najafloo and Hamidiaref has significant consequences:For the Operatives
- Identity compromise - Both individuals are now publicly identified
- Personal security risk - Exposed as IRGC cyber operatives
- Career impact - Unable to continue in covert operational roles
- Legal consequences - Potential for international sanctions and prosecution
- Travel restrictions - Likely to face visa denials and travel bans
For CharmingKitten Operations
- Infrastructure compromise - All documented infrastructure now exposed
- Credential exposure - Servers and accounts must be completely rebuilt
- Operational disruption - Significant resources required to rebuild infrastructure
- Trust damage - Operatives may question security of centralized documentation
- Attribution certainty - Strong evidence linking infrastructure to IRGC operations
For IRGC-IO Unit 1500
- Capability degradation - Years of infrastructure investment compromised
- Procedural review - Need to overhaul infrastructure management practices
- Recruitment challenges - Potential operatives may reconsider involvement
- International pressure - Increased sanctions and diplomatic consequences
- Operational pause - Time required to rebuild and re-establish capabilities
Connection to Leadership
Both infrastructure managers operated under the direction of: Abbas Rahrovi (aka Abbas Hosseini, National ID: 4270878835)- Head of CharmingKitten operations
- IRGC-IO official managing Department 40
- Established multiple front companies
- Direct oversight of infrastructure operations
- Previously exposed in Episode 1
Related Front Companies
Hamidiaref’s association with the front company JARF/ZHARF ANDISHAN TAFACOR SEFID provides additional attribution:- Company used to legitimize IRGC cyber operations
- Director and IRGC-IO official MANOOCHEHR VOSOUGHI NIRI
- Provided cover for infrastructure procurement and personnel employment
- Documents signed with official IRGC-IO approval
- Exposed in Episode 3 materials
Security Community Recommendations
Security researchers and threat intelligence analysts should:- Profile these individuals - Add to threat actor databases
- Monitor their activities - Watch for new infrastructure patterns
- Link to other operations - Look for additional infrastructure they may have managed
- Share intelligence - Contribute findings to community knowledge bases
- Attribution confidence - Use this exposure to strengthen attribution in reports
Defensive Actions
Organizations should:- Block known infrastructure - Implement controls for all documented IPs and domains
- Hunt for related activity - Search logs for connections to exposed infrastructure
- Update threat models - Incorporate CharmingKitten TTPs and infrastructure patterns
- Employee awareness - Train staff on CharmingKitten phishing techniques
- Monitoring - Watch for new infrastructure following similar patterns
Evidence Authenticity
The infrastructure documentation is verified through:- Cross-reference with known operations - Infrastructure matches reported CharmingKitten activity
- BELLACIAO and CYCLOPS links - Malware C2 servers match documented infrastructure
- Moses Staff attribution - Direct connection to IRGC influence operations
- Front company documents - Official paperwork linking Hamidiaref to IRGC
- Multi-year documentation - Consistent records spanning years of operations
Call to Action
These individuals believed they were operating safely under IRGC protection. Today, they are exposed to the world as agents of the Iranian regime conducting cyber espionage and influence operations. We encourage:- Media coverage - Report on these exposed operatives
- Government action - Implement sanctions and travel bans
- Industry response - Block infrastructure and share intelligence
- Community analysis - Examine the documentation and share findings