APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe

Cyber Security

ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign

This week, ESET researchers published their analysis of a new variant of the Android malware known as FurBall that APT-C-50 has used in its wider Domestic Kitten campaign. The campaign is known to take aim at Iranian citizens as part of mobile surveillance campaigns – and the same applies to this new FurBall version. Since June of last year, the malware has been distributed under the guise of a translation app via a copycat version of an Iranian website that provides translated articles, journals, and books. The Domestic Kitten campaign is still ongoing, dating back to at least 2016.

Watch the video to learn more.

Full technical details are available here: Domestic Kitten campaign spying on Iranian citizens with new FurBall malware.

Products You May Like

Articles You May Like

Ukraine’s Security Service Probes GRU-Linked Cyber-Attack on State Registers
Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware
Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
Thousands Download Malicious npm Libraries Impersonating Legitimate Tools
Sophisticated TA397 Malware Targets Turkish Defense Sector

Leave a Reply

Your email address will not be published. Required fields are marked *