Saturday, October 16, 2021

The Domestic Kitten hacking group has a threat to the Iranian regime

Must Read

NHS Error Exposes Information on Hundreds of Staff and Patients

Hundreds of NHS staff and patients have had their data vulnerable to strangers following inner procedure failures, and it...

Is Now the Time to Begin Protecting Government Data from Quantum Hacking?

The best technique for generating quantum-resistant encryption is to escape from the core power of computers, according to one...

Brewery Maker Molson Coors suffers cyberattack

Brewing giant Molson Coors revealed on Thursday that he had suffered a "cybersecurity incident" that disrupted the operation and...

Investigators have revealed the internal functioning of the Domestic Kitten team’s surveillance operations.

The Domestic Kitten also followed as the APT-C-50, is the leading opposition group (APT). First discovered in 2018, APT has ties to the Iranian government and is linked to domestic violence “which could be detrimental to the stability of the Iranian state,” according to Check Point.

Targeted people could include anti-government activists, human rights activists, journalists and lawyers.

In a blog post on Monday, a team of Check Point researchers said Domestic Kitten had been vigilant over the past four years, launching at least ten different campaigns and keeping a list of 1,200 people, at least.

So far, four active campaigns have been registered, the most recent of which appears to have begun in November and continues. Domestic Kitten Victims are found worldwide, including countries such as Iran, the US, Pakistan and Turkey.

APT uses a mobile malware called FurBall. The malware is based on commercially available software called KidLogger, and according to investigators, “it looks like the developers found the source code for KidLogger, or simply retrieved the sample and removed all the external components, adding more capabilities.”

FurBall is still distributed through various attacks, including phishing scams, Iranian websites, Telegram channels, and SMS messages containing malware link.

Malware uses multiple encryptions to trick the victim into installing; such as installing mobile security like “VIPRE”, pretending to be a news app, which acts as a redesigned mobile game available on Google Play, in-app stores, restaurant apps, and wallpaper apps.

Once installed on a targeted device, FurBall can receive SMS messages, capture call logs, collect device details, record contacts, steal media and saved files, monitor device GPS coordinates and therefore track their movements for purposes, and more.

Once the information has been collected from the damaged device, it can be sent to the command and control servers (C2) used by Domestic Kitten from 2018. Connected IP addresses are located in Iran, Tehran and Karaj.

On Monday, researchers at Check Point, along with SafeBreach, also unveiled the activities of a second-threatening group targeting Iranian opponents – but instead of focusing on their smartphones, their PCs are at risk.

Dubbed Infy, the APT – known to have been around since 2007 and allegedly sponsored by the government – has revived its efforts with previously unprecedented malware, major Infy malware upgrades, and repairs to previous C2 infrastructure.

a2434345d63481a40f0d145881b41013?s=96&d=mm&r=g
Priyanshu Vijayvargiya
Founder and Editor-in-Chief of 'Virtualattacks Inc' Priyanshu Vijayvargiya is a cybersecurity analyst, Information Security professional, developer, and a white hat hacker.

Leave a reply

Please enter your comment!
Please enter your name here

Latest News

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

More Articles Like This