APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe

Cyber Security

ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign

This week, ESET researchers published their analysis of a new variant of the Android malware known as FurBall that APT-C-50 has used in its wider Domestic Kitten campaign. The campaign is known to take aim at Iranian citizens as part of mobile surveillance campaigns – and the same applies to this new FurBall version. Since June of last year, the malware has been distributed under the guise of a translation app via a copycat version of an Iranian website that provides translated articles, journals, and books. The Domestic Kitten campaign is still ongoing, dating back to at least 2016.

Watch the video to learn more.

Full technical details are available here: Domestic Kitten campaign spying on Iranian citizens with new FurBall malware.

Products You May Like

Articles You May Like

Indonesia is a Spyware Haven, Amnesty International Finds
Pay up, or else? – Week in security with Tony Anscombe
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
North Korean Hackers Spoofing Journalist Emails to Spy on Policy Experts
Adding insult to injury: crypto recovery scams

Leave a Reply

Your email address will not be published. Required fields are marked *