ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > List all tools > List all groups using tool FurBall

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: FurBall

TypeReconnaissance, Backdoor, Info stealer, Exfiltration
Description(Check Point) The capabilities of the Domestic Kitten malware (which we are calling FurBall), include: collecting device identifiers, grabbing SMS messages and call logs, surround recording with the device microphone, call recording, stealing media files (such as videos and photos), obtaining a list of installed applications, tracking the device location, stealing files from the external storage, and more.

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

All groups using tool FurBall


APT groups

 Domestic KittenIran2016-Nov 2020 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]