In September last year, researchers at
Check Point
uncovered
an Iranian operation they named ‘Domestic Kitten’ and that used
Android
apps for targeted surveillance.
Active since 2016, the operation continued after this discovery with new malware found during the course of 2019. In a paper presented at VB2019 in London,
Check Point
researchers Aseel Kayal and Lotem Finkelstein analysed the campaign and noted that, despite it not being particularly advanced, it managed to steal some highly sensitive information.
Today we publish Aseel and Lotem’s paper in both
HTML
and
PDF
format. We have also uploaded the video of thier VB2019 presentation to our
YouTube
channel.
Leave a Reply