Home >
List all groups >
List all tools > List all groups using tool FurBall
Tool: FurBall
Names | FurBall |
Category | Malware |
Type | Reconnaissance, Backdoor, Info stealer, Exfiltration |
Description | (Check Point) The capabilities of the Domestic Kitten malware (which we are calling FurBall), include: collecting device identifiers, grabbing SMS messages and call logs, surround recording with the device microphone, call recording, stealing media files (such as videos and photos), obtaining a list of installed applications, tracking the device location, stealing files from the external storage, and more. |
Information | <https://research.checkpoint.com/2021/domestic-kitten-an-inside-look-at-the-iranian-surveillance-operations/> <https://www.trendmicro.com/en_us/research/19/f/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east.html> <https://ti.qianxin.com/blog/articles/surprised-by-cyrus-the-great-disclosure-against-Iran-cyrus-attack/> <https://www.virusbulletin.com/conference/vb2019/abstracts/domestic-kitten-iranian-surveillance-program> <https://documents.trendmicro.com/assets/appendix-mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east.pdf> <https://www.bleepingcomputer.com/news/security/domestic-kitten-apt-operates-in-silence-since-2016/> |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/apk.furball> |
Last change to this tool card: 24 April 2021
Download this tool card in JSON format
All groups using tool FurBall
1 group listed (1 APT, 0 other, 0 unknown)