Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
Overview
A new cyber campaign known as RedKitten is believed to be launched by a Farsi-speaking group linked to the Iranian government. This campaign specifically targets non-governmental organizations and activists who are documenting human rights abuses in Iran, particularly during the ongoing unrest that began in late 2025. Observed by HarfangLab in January 2026, the attacks aim to disrupt the efforts of those advocating for human rights and may involve various forms of cyber espionage or harassment. This targeting of NGOs poses significant risks not only to the organizations themselves but also to the broader landscape of human rights advocacy, as it can deter individuals and groups from speaking out against abuses. The situation underscores the challenges faced by activists in oppressive regimes and raises alarms about the potential for increased state-sponsored cyber activities against dissenters.
Key Takeaways
- Affected Systems: Human Rights NGOs, activists, individuals documenting human rights abuses
- Action Required: Organizations should enhance their cybersecurity measures, including implementing strong access controls, regular security training for employees, and using secure communication channels.
- Timeline: Ongoing since January 2026
Original Article Summary
A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It's said to coincide with the nationwide unrest in Iran that began towards the end of 2025,
Impact
Human Rights NGOs, activists, individuals documenting human rights abuses
Exploitation Status
The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.
Timeline
Ongoing since January 2026
Remediation
Organizations should enhance their cybersecurity measures, including implementing strong access controls, regular security training for employees, and using secure communication channels.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.