Researchers at CheckPoint has recently disclosed an ongoing surveillance operation by Iranian entities targeting Iranian Expatriates and protesters for years. Here, the Rampant Kitten hacking group used Android backdoors to extract the 2FA codes from SMS messages and records the phone’s voice surroundings.
Researchers the cybersecurity researchers at Check Point has named this hacking group as a Rampant Kitten, and they also affirmed that this hacking group mostly managed to keep the operations under the radar for at least six years.
Main Targets of Hackers
According to the Checkpoint Report, the hackers mainly targeted the Iranian minorities, anti-regime organizations, and resistance movements like:-
- Association of Families of Camp Ashraf and Liberty Residents (AFALR)
- Azerbaijan National Resistance Organization
- Balochistan people
Tools and Methods Used
Four alternatives of Windows info…