Posted by Martijn Grooten on Nov 18, 2019
In September last year, researchers at Check Point uncovered an Iranian operation they named 'Domestic Kitten' and that used Android apps for targeted surveillance.
Active since 2016, the operation continued after this discovery with new malware found during the course of 2019. In a paper presented at VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein analysed the campaign and noted that, despite it not being particularly advanced, it managed to steal some highly sensitive information.
Today we publish Aseel and Lotem's paper in both HTML and PDF format. We have also uploaded the video of thier VB2019 presentation to our YouTube channel.