Rampant Kitten Hackers Android Backdoor Extracts 2FA Codes from SMS

Researchers at CheckPoint has recently disclosed an ongoing surveillance operation by Iranian entities targeting Iranian Expatriates and protesters for years. Here, the Rampant Kitten hacking group used Android backdoors to extract the 2FA codes from SMS messages and records the phone’s voice surroundings.

Researchers the cybersecurity researchers at Check Point has named this hacking group as a Rampant Kitten, and they also affirmed that this hacking group mostly managed to keep the operations under the radar for at least six years.

Main Targets of Hackers

According to the Checkpoint Report, the hackers mainly targeted the Iranian minorities, anti-regime organizations, and resistance movements like:-

  • Association of Families of Camp Ashraf and Liberty Residents (AFALR)
  • Azerbaijan National Resistance Organization
  • Balochistan people

Tools and Methods Used

Four alternatives of Windows info…

Exit mobile version