• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
a new spyware is targeting telegram and psiphon vpn users

A New Spyware is Targeting Telegram and Psiphon VPN Users in Iran

You are here: Home / General Cyber Security News / A New Spyware is Targeting Telegram and Psiphon VPN Users in Iran
June 17, 2021

Threat actors with suspected ties to Iran have been identified to leverage quick messaging and VPN apps like Telegram and Psiphon to install a Windows distant obtain trojan (RAT) able of stealing delicate information from targets’ units due to the fact at least 2015.

Russian cybersecurity company Kaspersky, which pieced with each other the activity, attributed the marketing campaign to an advanced persistent risk (APT) team it tracks as Ferocious Kitten, a team that has singled out Persian-speaking people today allegedly primarily based in the place even though efficiently running beneath the radar.

“The focusing on of Psiphon and Telegram, the two of which are fairly popular providers in Iran, underlines the actuality that the payloads had been produced with the objective of targeting Iranian consumers in thoughts,” Kaspersky’s World wide Research and Evaluation Team (Excellent) claimed.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Stack Overflow Teams

“What’s more, the decoy material exhibited by the malicious files typically manufactured use of political themes and associated visuals or video clips of resistance bases or strikes in opposition to the Iranian routine, suggesting the attack is aimed at likely supporters of this kind of movements within the country.”

Kaspersky’s results emerge from two weaponized paperwork that had been uploaded to VirusTotal in July 2020 and March 2021 that appear embedded with macros, which, when enabled, drop following-stage payloads to deploy a new implant identified as MarkiRat.

The backdoor makes it possible for adversaries wide entry to a victim’s particular details, comprising capabilities to file keystrokes, capture clipboard material, download and add information, as properly as the capacity to execute arbitrary commands on the target device.

In what seems to be an try to grow their arsenal, the attackers also experimented with diverse variants of MarkiRat that ended up found to intercept the execution of applications like Google Chrome and Telegram to launch the malware and hold it persistently anchored to the computer system at the identical time also earning it much more challenging to be detected or taken off. One particular of the uncovered artifacts also incorporates a backdoored variation of Psiphon an open-source VPN resource generally employed to evade internet censorship.

A further new variant requires a plain downloader that retrieves an executable from a hardcoded domain, with the scientists noting that the “use of this sample diverges from people made use of by the team in the past, wherever the payload was dropped by the malware alone, suggesting that the group may possibly be in the procedure of transforming some of its TTPs.”

Enterprise Password Management

What is actually far more, the command-and-command infrastructure is also stated to have hosted Android purposes in the kind of DEX and APK information, increasing the likelihood that the menace actor is also concurrently acquiring malware aimed at cellular customers.

Apparently, the practices adopted by the adversary overlap with other groups that function in opposition to very similar targets, this kind of as Domestic Kitten and Rampant Kitten, with Kaspersky getting parallels in the way the actor employed the identical established of C2 servers over extended periods of time and attempted to collect data from KeePass password manager.

“Ferocious Kitten is an instance of an actor that operates in a wider ecosystem intended to monitor people in Iran,” the scientists concluded. “This kind of threat teams do not surface to be coated that generally and can thus get away with casually reusing infrastructure and toolsets without stressing about them currently being taken down or flagged by security options.”

Discovered this write-up attention-grabbing? Stick to THN on Fb, Twitter  and LinkedIn to study additional distinctive information we submit.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «australia internet banking outage blamed on ddos mitigation service Australia internet banking outage blamed on DDoS mitigation service
Next Post: UK government to consider gutting GDPR rules uk government to consider gutting gdpr rules»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.