Names | Lucky Cat LuckyCat | |
Category | Malware | |
Type | Backdoor, Info stealer, Exfiltration | |
Description | (Dark Reading) Trend Micro researchers found two Android apps in the early phase of development that can communicate with Luckycat's command-and-control (C&C) server. The malware is currently capable of gathering information on the mobile device and uploading and downloading files as directed by the C&C server. Some of the features, including remote shell, are still under construction, and it's unclear just how the attackers plan to infect victims with the mobile malware, according to Trend Micro. | |
Information | <https://www.darkreading.com/attacks-breaches/luckycat-apt-campaign-building-android-malware/d/d-id/1138130> <https://blog.talosintelligence.com/2019/02/exilerat-shares-c2-with-luckycat.html> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/apk.luckycat> |
Last change to this tool card: 28 December 2022
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Lucky Cat | 2011 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |