APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe

Cyber Security

ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign

This week, ESET researchers published their analysis of a new variant of the Android malware known as FurBall that APT-C-50 has used in its wider Domestic Kitten campaign. The campaign is known to take aim at Iranian citizens as part of mobile surveillance campaigns – and the same applies to this new FurBall version. Since June of last year, the malware has been distributed under the guise of a translation app via a copycat version of an Iranian website that provides translated articles, journals, and books. The Domestic Kitten campaign is still ongoing, dating back to at least 2016.

Watch the video to learn more.

Full technical details are available here: Domestic Kitten campaign spying on Iranian citizens with new FurBall malware.

Products You May Like

Articles You May Like

Massive Telecom Hack Exposes US Officials to Chinese Espionage
Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes
New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 – Nov 10)
Pro-Russian Hacktivists Target South Korea as North Korea Joins Ukraine War

Leave a Reply

Your email address will not be published. Required fields are marked *