This week, ESET researchers published their analysis of a new variant of the Android malware known as FurBall that APT-C-50 has used in its wider Domestic Kitten campaign. The campaign is known to take aim at Iranian citizens as part of mobile surveillance campaigns – and the same applies to this new FurBall version. Since June of last year, the malware has been distributed under the guise of a translation app via a copycat version of an Iranian website that provides translated articles, journals, and books. The Domestic Kitten campaign is still ongoing, dating back to at least 2016.
Watch the video to learn more.
Full technical details are available here: Domestic Kitten campaign spying on Iranian citizens with new FurBall malware.
Connect with us on Facebook, Twitter, LinkedIn and Instagram.