APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe

ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign

This week, ESET researchers published their analysis of a new variant of the Android malware known as FurBall that APT-C-50 has used in its wider Domestic Kitten campaign. The campaign is known to take aim at Iranian citizens as part of mobile surveillance campaigns – and the same applies to this new FurBall version. Since June of last year, the malware has been distributed under the guise of a translation app via a copycat version of an Iranian website that provides translated articles, journals, and books. The Domestic Kitten campaign is still ongoing, dating back to at least 2016.

Watch the video to learn more.

Full technical details are available here: Domestic Kitten campaign spying on Iranian citizens with new FurBall malware.

Connect with us on FacebookTwitterLinkedIn and Instagram.

Sign up to receive an email update whenever a new article is published in our Ukraine Crisis – Digital Security Resource Center