In my previous analyses of the Charming Kitten leak, I examined the organizational structure, target lists, financial infrastructure, and operational capabilities of Iran's APT35 hacking unit. The disclosures identified key personnel, front companies, and thousands of compromised systems across five continents. Now, additional materials from the same network access reveal three significant findings: complete salary records for both male and female operative teams, expanded footage of the Kashef surveillance platform, and a classified 2004 document showing Iran obtained confidential IAEA inspection materials, with a direct connection to an individual previously identified as a Department 40 assassination target.

Salary Records: The Financial Reality of IRGC Cyber Operations

The leaked materials include payslips and financial records documenting compensation for operatives in both the Sisters Team (Aqiq) and Brothers Team (Pelak1). These documents provide unprecedented visibility into how Iran compensates its state-sponsored hacking personnel.

Sisters Team Payslips (Ordibehesht 1404 / April-May 2025)

Seventeen monthly salary slips (فیش حقوق و مزایای ماهانه) from the women's division reveal the following:

NameBank AccountNet Salary (Rials)Net Salary (USD)
Leila Sharifi (لیلا شریفی)462833121892951273,710,000~$220
Parisa Zare (پریسا زارع)3120063542693267,790,513~$215
Sedigheh Bagher (صدیقه باقر)1862802100479691235,071,681~$189
Ameneh Dehghan (آمنه دهقان)1867701181470651233,000,000~$187
Azam Sadeghi (اعظم صادقی)3120069459601231,512,180~$186
Fatemeh Najafi (فاطمه نجفی)3101059749397223,259,181~$180
Masoumeh Bashiri (معصومه بشیری)3120105942485219,008,334~$176
Zahra Yarahmadi (زهرا یاراحمدی)3013701181476781207,031,347~$166
Mohaddeseh Sadat Mousavi (محدثه سادات موسوی)5301802192761911204,929,181~$165
Khadijeh Mortazavi (خدیجه مرتضوی)4410701189094421173,482,180~$140
Mehrnoosh Rezaali (مهرنوش رضاعلی)3120075749172168,759,680~$136
Zahra Ansari (زهرا انصاری)3130024332179134,200,000~$108
Narges Nadafi (نرگس ندافی)381877185030261126,635,000~$102
Fatemeh Bolhasani (فاطمه بوالحسنی)312010153033077,583,333~$62
Hananeh Azizi (حنانه عزیزی)312005729185377,171,667~$62
Atefeh Rabani (عاطفه ربانی)182879219278465133,932,500~$27
Atieh Nadafi (عطیه ندافی)31200627176036,175,000~$5

The salary distribution reveals a clear hierarchy within the Sisters Team. Senior operatives like Leila Sharifi and Parisa Zare earn over $200 monthly, while junior or part-time personnel such as Atieh Nadafi receive minimal compensation. The presence of two individuals with the surname Nadafi (Narges and Atieh) at different pay grades suggests possible familial recruitment patterns within the unit.

Brothers Team Financial Records

A separate spreadsheet documents eighteen male operatives in the Brothers Team, including their names and bank account numbers:

NameBank AccountNet Salary (Rials)Net Salary (USD)
Davood Ghanbari (داوود قنبری)1810701451116417216,248,062~$174
Milad Gholami (میلاد غلامی)1051702183947351150,000,000~$121
Mohammad Rahimi Farab (محمد رحیمی فاراب)1870756659865614136,000,000~$109
Seyed Mohammad Keshvari Hashemi (سید محمد کشوری هاشمی)3120096233454160,828,024~$129
Alireza Moghadam (علیرضا مقدم)381870188841701195,374,294~$157
Ahmad Habri (احمد حبری)3130010221779158,208,110~$127
Akbar Boshagh (اکبر بسحاق)381870172465511156,558,944~$126
Amir Pour Ghadimi (امیر پور قدیمی)2228300188911232,000,000~$187
Arman Karami Goudarzi (آرمان کرمی گودرزی)302833121092311225,561,840~$181
Vahid Ghorbani Badakhsh (وحید قربانی بدخش)3130169041901300,060,392~$241
Erfan Hamidi Aref (عرفان حمیدی عارف)1810701169605181214,560,962~$173
Davood Akbari Mojadar (داوود اکبری مجدر)551233100109751410,750,000~$330
Davood Bayat (داوود بیات)18567015415466148,000,000~$39
Amir Ali Mansouri (امیر علی منصوری)748301234705156,448,552~$126
Omid Fallah (امید فلاح)3812701178325141314,500,000~$253
Mohammad Hassan Hassanzadeh Vozhdeh (محمد حسن حسن زاده وژده)3833701179296291334,500,000~$269
Hassan Arab Ahmadi (حسن عرب احمدی)5394874161641101269,560,392~$217
Alireza Feizi (علیرضا فیضی)4615701184072211184,908,667~$149

These records complement the organizational structure previously documented, confirming the approximate size of both teams and providing financial identifiers that enable sanctions authorities and financial investigators to trace IRGC payment networks.

Kashef Surveillance Platform: Expanded Capabilities Revealed

A second video obtained from the leaked data provides additional insight into the Kashef system (سامانه کاشف), the surveillance platform I previously documented. The new footage reveals the full scope of data integration across IRGC intelligence departments and the system's comprehensive tracking capabilities.

Intelligence Department Integration

The Kashef platform aggregates data from multiple IRGC Intelligence Organization departments, each responsible for specific geographic or demographic targets:

DepartmentDesignationFocus Area
1530اداره 1530 - حوزه خلیج فارسPersian Gulf Zone
1540اداره 1540 - رژیم صهیونیستیZionist Regime (Israel)
1550اداره 1550 - آمریکاUnited States
1560اداره 1560 - اداره اتباعForeign Nationals

Beyond these geographic divisions, the system incorporates specialized databases tracking:

  • Foreign Travels of Iranians (سفرهای خارجی ایرانیان) - 777+ records visible in footage
  • Dual Nationals (دو تابعیتی ها)
  • Students Abroad (دانشجویان خارج از کشور)
  • Visits to Diplomatic Premises (تردد به اماکن دیپلماتیک) - 494+ records visible
  • Iranian Embassy Staff (کارکنان سفارتخانه های ایران)
  • Companies Related to Foreign Entities (شرکت های مرتبط با خارج)
  • International Journalists (خبرنگاران بین المللی)

Personal Data Collection

The video demonstrates the extensive personal information Kashef collects on each individual:

Identity Information:

  • National ID (کد ملی)
  • Passport number (شماره گذرنامه)
  • Birth certificate number (شماره شناسنامه)
  • Birth date and place
  • Province of birth

Family Relations:

  • Father's name (نام پدر)
  • Mother's name (نام مادر)
  • Spouse's name (نام همسر)
  • Children's names (نام فرزند)
  • Aliases (نام مستعار)

Contact and Professional:

  • Phone numbers
  • Email addresses
  • Occupation
  • Field of study
  • Education level

Religious Profiling:

  • Religion (دین)
  • Sect, specifically Shia or Sunni (مذهب)

The inclusion of sectarian identification is notable. The system explicitly categorizes Iranian citizens by whether they are Shia or Sunni, enabling religious profiling of the population.

Embassy and Diplomatic Surveillance

The footage shows Kashef's capabilities for monitoring visits to foreign diplomatic premises in Tehran. Sample records reveal surveillance of embassies including Germany, Turkey, Japan, and South Africa. For each visit, the system records:

  • Residence status of visitor
  • Embassy or country visited
  • Vehicle details (make, model, color)
  • License plate number
  • Date of visit
  • Entry and exit times
  • Intelligence notes
  • Reference file number

The intelligence notes field contains annotations such as "Internal agents" and "Embassy agents," indicating human intelligence sources reporting on diplomatic visitors.

Border Crossing Records

The system maintains detailed records of all border crossings, including passport numbers, specific border points (such as Lar Airport and Shiraz Airport), and religious sect. Sample queries shown in the video track travel from Fars Province to the UAE, demonstrating the granularity of movement surveillance available to operators.

Cross-Reference Capabilities

A progress indicator visible in the footage shows a "merge process" (فرآیند ادغام) at 99% completion, indicating the system's ability to cross-reference and combine records across multiple databases to build comprehensive profiles on individuals of interest.

The IAEA Document: A Twenty-Year Connection

Among the files retrieved from Department 40's compromised infrastructure, one document stands apart from the operational files. This classified 2004 communication from Iran's Ministry of Intelligence was found on the personal computer of Abbas Rahrovi, the department head I identified in previous reporting. Rahrovi's machine contained highly classified Revolutionary Guards documents beyond the unit's cyber operations. This document reveals that Iranian intelligence obtained confidential IAEA inspection documents two decades ago.

Embedded image

The letter, classified SECRET with URGENT priority, dated May 19, 2004, was addressed to Major General Firouzabadi, Chief of the General Staff of the Armed Forces, and Admiral Shamkhani, Minister of Defense. It notifies senior military leadership that Iranian intelligence had obtained internal IAEA documents regarding heavy water production and the heavy water reactor program at Arak. The document confirms that 27 pages of confidential IAEA documents were attached, including a technical report compiled by Heinonen, Charlier, Pedraza, and Koizumi under the title "Heavy Water Reactor Program and Heavy Water Production (Findings in Iran)." The letter also references 18 questions the IAEA had prepared to pose during their May 2004 inspection visit to Arak.

The Olli Heinonen Connection

The first name listed among the IAEA report authors is Olli Heinonen, who served as IAEA Deputy Director-General for Safeguards from 2005 to 2010. Heinonen was the agency's chief nuclear inspector and played a central role in investigating Iran's nuclear program during this period.

Embedded image

In my previous reporting on the Department 40 leak, I documented that Heinonen appears on the unit's target list for surveillance and potential assassination operations. The department that conducts cyber espionage also maintains target packages on individuals for kinetic operations, and Heinonen was identified as a high-priority target.

This 2004 document, stored on the same network infrastructure, provides context for why Heinonen became a target. As the lead author of IAEA technical assessments on Iran's nuclear program and the architect of inspection questions, Heinonen possessed detailed knowledge of what the agency knew, and what it suspected, about Iranian nuclear activities. The fact that Iranian intelligence obtained his confidential reports demonstrates both the sensitivity of his work and Iran's interest in understanding exactly what he knew.

The Handwritten Annotations

The document contains handwritten marginal notes that reveal who was involved in handling this intelligence. Two names appear: "سردار وحیدی" (Sardar Vahidi) and "موسسه فخری‌زاده" (Fakhrizadeh Institute), with a date of 83/2/31 (May 20, 2004)

Ahmad Vahidi was IRGC Quds Force commander at the time, later served as Minister of Defense (2009-2013), and is currently Iran's Minister of Interior. He remains wanted by Interpol for his alleged role in the 1994 AMIA Jewish center bombing in Argentina that killed 85 people.

The reference to "Fakhrizadeh Institute" is more significant. Mohsen Fakhrizadeh headed Iran's AMAD Project, the covert nuclear weapons program. Israeli intelligence described him as the "father of the Iranian nuclear bomb." He was assassinated near Tehran in November 2020 in an operation widely attributed to Israel.

Embedded image

That Fakhrizadeh's organization appears handwritten on a 2004 document concerning IAEA inspections of nuclear facilities at Arak directly connects his institute to the nuclear program years before his role became publicly known internationally. This document sat on the computer of the man whose unit later compiled target lists that included nuclear inspectors.

Why This Document Was on Rahrovi's Computer

The presence of a twenty-year-old Ministry of Intelligence document on the personal computer of an IRGC cyber operations commander raises questions about information sharing between Iranian intelligence agencies, and about Rahrovi's role beyond hacking operations. Department 40 operates under the IRGC Intelligence Organization, separate from the Ministry of Intelligence (MOIS) that authored this document.

That Rahrovi personally retained this classified material alongside other highly sensitive Revolutionary Guards documents suggests he was not merely a technical operations manager. The document may have been provided as background material when Heinonen was designated as a Department 40 target. Its presence on Rahrovi's machine, rather than in general network storage, indicates the department head's direct involvement in operations concerning individuals connected to Iran's nuclear program oversight.

Implications

The exposure of salary records transforms abstract threat actor designations into documented employment relationships. These thirty-five individuals now have their financial ties to IRGC cyber operations confirmed through their own payroll records. Combined with previously leaked Iranian data, researchers can now cross-reference these bank account numbers against other data points to build more complete profiles on each operative, potentially uncovering additional identities, addresses, and connections not visible in the Department 40 files alone.

The expanded Kashef footage demonstrates that Iranian surveillance infrastructure extends far beyond cyber operations. The system's integration of religious sect data, embassy visit tracking, and cross-referencing capabilities reveals a comprehensive domestic surveillance apparatus targeting Iranian citizens based on their travel, contacts, and even their branch of Islam.

The IAEA document provides historical depth to Department 40's targeting of Olli Heinonen. This was not arbitrary selection. Heinonen authored the confidential assessments that Iranian intelligence successfully obtained, making him a person of enduring interest to a regime concerned with understanding and countering international nuclear oversight.

The materials continue to emerge from the same network access that exposed Charming Kitten's operations. Each disclosure adds detail to the picture of how Iran's cyber capabilities integrate with broader intelligence and security objectives, from compensating operatives through front company payrolls to maintaining target packages on international officials who scrutinized the nuclear program two decades ago.