Magic Hound / APT35
Repository Navigation
- Actor workbench: Magic Hound
- TTP-to-detection matrix: all mapped techniques
- Surface and capability routes: Identity, MDM, And Cloud Administration
- Detection status: dashboard
- Hunt workflow: hunt workflow
- ATT&CK mappings: T1566.002 Spearphishing Link (M2); T1583.001 Acquire Domains (M1)
- Mapped detections: DET-004 Mail Click To Execution Correlation (Hunt, DRL-4)
- Mapped hunts: HUNT-004 If VIP phishing is active then mail click events will correlate to risky sign-in or execution
- IOC reference sources: None currently mapped.
- Tool detail pages:
FRP / Plink;Mimikatz / SQLMap / Havij;CharmPower;DownPaper;Impacket;ipconfig;Mimikatz;Net;netsh;Ping;PowerLess;PsExec;Pupy;Systeminfo - Tool matrix: all actor-linked tools (14 mapped tool row(s))
- Evidence records:
EVD-015/CLM-APT35-001 - Imported research intakes: OilRig And Magic Hound Deep Research Intake (High, Needs source validation); APT35 And OilRig Israel Deep Research Intake (High, Needs source validation)
- Intel update candidates: 1 current candidate(s)
- Source IDs in structured data:
SRC-MITRE-G0059
Aliases: Charming Kitten, COBALT ILLUSION, Phosphorus, Newscaster, Mint Sandstorm, ITG18 (IBM), Ballistic Bobcat (ESET), Group 83.
Assessed sponsor: IRGC-IO (Islamic Revolutionary Guard Corps Intelligence Organisation) per Proofpoint, Mandiant, and U.S. Treasury designations.
Vendor naming caveat — TA453: MITRE G0059 lists TA453 as a Magic Hound / APT35 alias. However, Proofpoint (2023), Volexity (2024), and Recorded Future map TA453 as roughly equivalent to APT42 rather than APT35. Analysts should note which vendor's taxonomy their source uses before attributing TA453 activity to this profile. See also the APT42 profile.
Relevance
APT35-related reporting is highly relevant to Israeli government because the actor family is associated with credential phishing, persona-based social engineering, and targeting of policy, defense, academia, media, and regional entities.
Defensive Focus
- Fake login portals and domain impersonation.
- Spearphishing links and long-running social engineering.
- Mailbox access after credential theft.
- OAuth consent and MFA reset attempts.
Detection Ideas
- New inbox rules after risky sign-in.
- MFA method registration after impossible travel or new device sign-in.
- Lookalike domains targeting ministries, public agencies, or suppliers.
Sources: SRC-MITRE-G0059, SRC-MS-MINT-SANDSTORM, SRC-MS-MINT-PROFILE, SRC-CP-EDUCATED-2023, SRC-CP-EDUCATED-2025.