ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool FurBall

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: FurBall

NamesFurBall
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Exfiltration
Description(Check Point) The capabilities of the Domestic Kitten malware (which we are calling FurBall), include: collecting device identifiers, grabbing SMS messages and call logs, surround recording with the device microphone, call recording, stealing media files (such as videos and photos), obtaining a list of installed applications, tracking the device location, stealing files from the external storage, and more.
Information<https://research.checkpoint.com/2021/domestic-kitten-an-inside-look-at-the-iranian-surveillance-operations/>
<https://www.trendmicro.com/en_us/research/19/f/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east.html>
<https://ti.qianxin.com/blog/articles/surprised-by-cyrus-the-great-disclosure-against-Iran-cyrus-attack/>
<https://www.virusbulletin.com/conference/vb2019/abstracts/domestic-kitten-iranian-surveillance-program>
<https://documents.trendmicro.com/assets/appendix-mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east.pdf>
<https://www.bleepingcomputer.com/news/security/domestic-kitten-apt-operates-in-silence-since-2016/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/apk.furball>

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

Previous: FunnySwitch
Next: GamaPOS

All groups using tool FurBall

ChangedNameCountryObserved

APT groups

 Domestic KittenIran2016-Oct 2022 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]