ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar
Jump to navigation
Jump to search
(Publication) Google search: [1]
ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar | |
---|---|
Botnet | ViperRAT |
Malware | |
Botnet/malware group | RAT |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | Israeli Defence Force, Israel |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2017 / 2017-02-16 |
Editor/Conference | Lookout |
Link | https://blog.lookout.com/blog/2017/02/16/viperrat-mobile-apt/ (Archive copy) |
Author | Michael Flossman |
Type | Blogpost |
Abstract
“ The threat actors behind the ViperRAT surveillanceware collect a significant amount of sensitive information off of the device, and seem most interested in exfiltrating images and audio content. The attackers are also hijacking the device camera to take pictures.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2017BFR5318, editor = {Lookout}, author = {Michael Flossman}, title = {ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar}, date = {16}, month = Feb, year = {2017}, howpublished = {\url{https://blog.lookout.com/blog/2017/02/16/viperrat-mobile-apt/}}, }