Overview
This page documents the key personnel identified as members of the CharmingKitten APT operating under IRGC-IO’s Counterintelligence Division (Unit 1500), Department 40.Leadership
Abbas Rahrovi (Abbas Hosseini)
Abbas Rahrovi (aka Abbas Hosseini)
4270844116
IRGC Official / APT Operations Director
- Directed attacks against dozens of targets
- Managed campaign activity and assets
- Coordinated malicious activity against international targets
- Operated as a “shadow man” until exposure
- Telecommunications companies
- Aviation companies
- Intelligence organizations
- Countries in Middle East and Gulf region (Turkey, UAE, Qatar, Afghanistan, Israel, Jordan)
Abbas Rahrovi believed he was operating under the protective cover of the IRGC. The exposure is considered highly embarrassing for Iranian leadership.
Operations Personnel
Key Operators Summary
| Name | National ID | Role | Notes |
|---|---|---|---|
| Abbas Rahrovi | 4270844116 | APT Director | aka Abbas Hosseini, IRGC Official |
| Vahid Molawi | 0323217087 | Attacker | Karaj team member |
| MOHAMMAD NAJAFLOO | 4270878835 | Infrastructure Manager | Former senior employee, maintained infrastructure Excel sheets for years |
| MOHAMMADERFAN HAMIDIAREF | 0023199709 | Infrastructure Manager | Took over from Najafloo, continued managing infrastructure |
| MANOOCHEHR VOSOUGHI NIRI | N/A | IRGC-IO Official | Company director, signed documents for front company JARF/ZHARF ANDISHAN TAFACOR SEFID |
| MOHAMMAD ERFAN HAMIDI AREF | N/A | APT Employee | Listed in front company documents |
Detailed Personnel Profiles
Vahid Molawi
National ID: 0323217087 Team: Karaj team Role: Attacker Evidence:- Mentioned in hours reports from Episode 1
- Daily work reports documented his activities
MOHAMMAD NAJAFLOO
National ID: 4270878835 Role: Former Senior Infrastructure Manager Responsibilities:- Maintained infrastructure Excel sheets for years
- Documented server procurement identities
- Managed server login credentials
- Tracked attack servers and file storage servers
- All operational servers
- Procurement identities used to acquire infrastructure
- Login credentials for servers on the internal network
- Details of attack servers (e.g., Tunnel servers)
- File storage and extraction systems
MOHAMMADERFAN HAMIDIAREF
National ID: 0023199709 Role: Current Infrastructure Manager Background:- Took over infrastructure management role after NAJAFLOO’s departure
- Continued maintaining the infrastructure Excel sheets
- Manages operational server documentation
- Server infrastructure management
- Credential management
- Infrastructure documentation
- Operational systems access
MANOOCHEHR VOSOUGHI NIRI
Persian Name: منوچهر وثوقی نیری Role: IRGC-IO Official / Company Director Activities:- Serves as director of front company JARF/ZHARF ANDISHAN TAFACOR SEFID
- Signs official documents for the cover company
- IRGC-IO official managing cover operations
- Document 5e98006a2cf1c15a164279558eed4a15018e34a0_بسمه تعالی
- Signature on company documents
MOHAMMAD ERFAN HAMIDI AREF
Persian Name: محمد عرفان حمیدی عارف Role: APT Employee Connection:- Listed as employee in front company documentation
- Associated with JARF/ZHARF ANDISHAN TAFACOR SEFID
- Named in official documents signed by MANOOCHEHR VOSOUGHI NIRI
Note: There appears to be a variation in the spelling of this individual’s name in different documents (HAMIDIAREF vs HAMIDI AREF). These may refer to the same person or different individuals.
Team Structure
Karaj Team
Identified member:- Vahid Molawi (0323217087) - Attacker role
- Daily work reports
- Hours reports
- Attack reports
Additional Teams
Documentation indicates multiple teams:- MJD (Referenced in daily reports)
- HSN2 (Referenced in report structures)
Evidence Documentation
Internal Records
Personnel activities documented through: Daily Work Reports:- MJD_Monthly-Reps_Mehr_1403 series
- Daily reports from 1403-06-25 through 1403-07-15
- Hours tracking and activity logs
- Monthly performance reports (بهمن ماه)
- Target-specific operation reports
- Technical exploitation reports (e.g., CVE-2024-1709)
- Excel sheets with server details
- Service procurement records
- Payment tracking (including BTC payments)
Communication Platforms
Personnel used internal communication systems:- Issabelle
- 3CX
- Output Messenger
- Signal
Operational Security Failures
The exposure of these personnel resulted from:- Network Breach: Complete compromise of Department 40’s internal network
- Documentation Leaks: Excel sheets, reports, and internal documents
- Communication Logs: Chat logs from internal platforms
- Photo Evidence: Employee photos from internal network