Domestic Kitten

Description

(Check Point) Recent investigations by Check Point researchers reveal an extensive and targeted attack that has been taking place since 2016 and, until now, has remained under the radar due to the artful deception of its attackers towards their targets. Through the use of mobile applications, those behind the attack use fake decoy content to entice their victims to download such applications, which are in fact loaded with spyware, to then collect sensitive information about them. Interestingly, these targets include Kurdish and Turkish natives and ISIS supporters. Most interesting of all, though, is that all these targets are actually Iranians citizens.

Considering the nature of the target, the data collected about these groups provides those behind the campaign with highly valuable information that will no doubt be leveraged in further future action against them. Indeed, the malware collects data including contact lists stored on the victim’s mobile device, phone call records, SMS messages, browser history and bookmarks, geo-location of the victim, photos, surrounding voice recordings and more.

The targets are Kurdish and Turkish natives and ISIS supporters.

Names

NameName-Giver
Domestic KittenCheck Point
APT-C-50Check Point
Bouncing GolfTrend Micro

Country

State-sponsored

Motivation

  • Information theft and espionage

First Seen

2016

Observed Countries

Tools

Operations

Information

Mitre Attack

Other Information

Uuid

624ad02b-d8c3-4873-93a4-28d9811b55d5

Last Card Change

2022-12-31