Updated on 2022-10-21
ESET said it detected a new cyber-espionage campaign carried out by APT-C-50, an Iran-based threat actor. The campaign, which the company named Domestic Kitten, targets Iranian citizens with a new version of the FurBall malware hidden inside an Android translation app. Read more: Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
Overview
A new strain of the FurBall Android spyware was found targeting Iranian citizens in mobile surveillance campaigns conducted by APT-C-50, aka Domestic Kitten, an Iranian state-sponsored gang. Read more: Domestic Kitten campaign spying on Iranian citizens with new FurBall malware