NoGoolag
4.54K subscribers
13.2K photos
6.93K videos
587 files
14.1K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
Rampant Kitten – An Iranian Espionage Campaign

Introduction

Check Point Research unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were previously reported by other researchers and journalists, our investigation allowed us to connect the different campaigns and attribute them to the same attackers.

πŸ’‘ Among the different attack vectors we found were:

πŸ‘‰πŸΌ Four variants of Windows infostealers intended to steal the victim’s personal documents as well as access to their Telegram Desktop and KeePass account information

πŸ‘‰πŸΌ Android backdoor that extracts two-factor authentication codes from SMS messages, records the phone’s voice surroundings and more

πŸ‘‰πŸΌ Telegram phishing pages, distributed using fake Telegram service accounts

πŸ’‘
The above tools and methods appear to be mainly used against Iranian minorities, anti-regime organizations and resistance movements such as:

πŸ‘‰πŸΌ Association of Families of Camp Ashraf and Liberty Residents (AFALR)

πŸ‘‰πŸΌ Azerbaijan National Resistance Organization

πŸ‘‰πŸΌ Balochistan people

πŸ‘€ πŸ‘‰πŸΌ
https://research.checkpoint.com/2020/rampant-kitten-an-iranian-espionage-campaign/

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/iranian-hacker-group-developed-android-malware-to-steal-2fa-sms-codes

#iranian #hacker #rampantkitten #android #malware #espionage #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag