apk.unidentified_003 (Back to overview)

Unidentified APK 003

Actor(s): Domestic Kitten

According to Check Point, they uncovered an operation dubbed "Domestic Kitten", which uses malicious Android applications to steal sensitive personal information from its victims: screenshots, messages, call logs, surrounding voice recordings, and more. This operation managed to remain under the radar for a long time, as the associated files were not attributed to a known malware family and were only detected by a handful of security vendors.

2019-10-02Virus BulletinAseel Kayal, Lotem Finkelstein
@online{kayal:20191002:domestic:f400298, author = {Aseel Kayal and Lotem Finkelstein}, title = {{Domestic Kitten: an Iranian surveillance program}}, date = {2019-10-02}, organization = {Virus Bulletin}, url = {}, language = {English}, urldate = {2020-01-09} } Domestic Kitten: an Iranian surveillance program
Unidentified APK 003
2018-09-07Bleeping ComputerIonut Ilascu
@online{ilascu:20180907:domestic:18a5d5c, author = {Ionut Ilascu}, title = {{Domestic Kitten APT Operates in Silence Since 2016}}, date = {2018-09-07}, organization = {Bleeping Computer}, url = {}, language = {English}, urldate = {2019-12-20} } Domestic Kitten APT Operates in Silence Since 2016
Unidentified APK 003 Domestic Kitten

There is no Yara-Signature yet.