ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Rocket Kitten, Newscaster, NewsBeef

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Rocket Kitten, Newscaster, NewsBeef

NamesRocket Kitten (CrowdStrike)
Newscaster (Symantec)
NewsBeef (Kaspersky)
Group 83 (Talos)
Parastoo (Flashpoint)
CountryIran Iran
MotivationInformation theft and espionage
First seen2011
Description(Kaspersky) Newsbeef/Newscaster will find a way to compromise a web site, usually the vulnerability appears to be CMS related, in an outdated WordPress plugin, Joomla version, or Drupal version. Attackers usually perform one of two things, Newsbeef has been performing the first of the two:

- inject a src or iframe link into web pages or css sheets
- inject the content of an entire BeEF web page into one of the internally linked javascript helpers

The injected link will redirect visitors’ browsers to a BeEF server. Usually, the attackers deliver some of the tracking and system/browser identification and evercookie capabilities. Sometimes, it appears that they deliver the metasploit integration to exploit and deliver backdoors (we haven’t identified that exploitation activity in our ksn data related to this group just yet). Sometimes, it is used to pop up spoofed login input fields to steal social networking site credentials. We also haven’t detected that in ksn, but some partners have privately reported it about various incidents. But we have identified that attackers will redirect specific targets to laced Adobe Flash and other installers from websites that they operate.

So, the watering hole activity isn’t always and usually isn’t delivering backdoors. Most of the time, the watering hole injections are used to identify and track visitors or steal their browser history. Then, they deliver the backdoors to the right targets.

There is some infrastructure overlap with Magic Hound, APT 35, Cobalt Illusion, Charming Kitten and ITG18.
ObservedSectors: Construction, Defense, Education, Embassies, Entertainment, Government, Manufacturing, Media.
Countries: Algeria, Brazil, China, Germany, India, Israel, Japan, Kazakhstan, Romania, Russia, Turkey, UK, Ukraine, USA.
Tools usedBeEF, FireMalv, Ghole.
Operations performed2011Operation “Newscaster”
The research firm iSight dubbed the operation Newscaster and said hackers used social-media sites like Twitter, Facebook and LinkedIn to draw their targets and then lure them to check out a bogus news site,, filled with foreign policy and defense articles, The Post reported.
The overall aim is that the social-media platform would give the hackers connections with those at the top of public policy — and position them to tap into that information network.
Feb 2015Operation “Woolen-GoldFish”
Feb 2016In late February 2016, a University website in Iran stood out for thoroughly vetting its current and potential students and staff. The University’s web site served repackaged content from the Browser Exploitation Framework (BeEF) with embedded JavaScript content.
2017Fake news website BritishNews to infect visitors
On the same note, we identified a fake-news agency “established” by the attackers, called “The British news agency” or “Britishnews” (inspired by BBC). Its website domain is[.]co and two other domains, broadcastbritishnews[.] ommand britishnews[.]org redirected to it.
2017Blackmailing BBC reporter with ‘naked photo’ threats
Iranian agents blackmailed a BBC Persian journalist by threatening to publish revealing photos of her as part of a wider campaign against the British media outlet, staff at the broadcaster told Arab News.
New details emerged on Saturday about alleged harassment of BBC Persian reporters’ family members and loved ones at the hands of the Iranian security services.

Last change to this card: 13 September 2022

Download this actor card in PDF or JSON format

Previous: Roaming Tiger
Next: RTM

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]