Download Certificate- CMOs | ECIO | Most Admired Brand | Most Trusted Company

Check Point Research reveals Iranian hackers stealing info from Windows systems, SMS: Report


By MYBRANDBOOK


Check Point Research reveals Iranian hackers stealing info from Windows systems, SMS: Report

Iranian hacker group named Rampant Kitten has developed tools to steal information from Windows System, Telegrams and even via SMS as revealed by Check Point Research. According to the researchers at Check Point, these hacking tools were primarily used against Iranian minorities, anti-regime organisations and resistance movements.

 

Check Point researchers have revealed that the hacker group has been active for around six years. In a report, Check Point detailed the different hacking tools deployed by the group. One includes four variants of Windows infostealers that can steal the user’s personal documents. It can also get access to the user’s Telegram desktop app, and KeePass account information as well.

 

The hackers also developed an Android backdoor that can extract two-factor authentication codes from SMS messages. This Android backdoor is disguised as an app that helps Persian speakers in Sweden get their driver’s license. In addition to 2FA, it can also gain access to personal information like contacts and account details, device information and activate voice recording. It can even perform Google account phishing attacks.

 

Telegram is another popular platform for these hackers to exploit. In some cases, the hackers posed as the official Telegram account and hosted phishing pages on the platform. Similar to the authentic Telegram account, this one too would start out by sending messages of the app’s updates. It was only after a few days that the account would send phishing messages. The messages warned users of their accounts being reported for misusing Telegram, and they have to verify their account by clicking on a link.

 

Considering the groups that are targeted by this hacking group, Check Point’s report highlights that the hackers want to understand the behaviour and activities of the victims. Check Point suspects another similar case to occur where hackers try to get information on the same group of people.

 E-Magazine 
 VIDEOS  Placeholder image

Copyright www.mybrandbook.co.in @1999-2024 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org