Iranian hackers’ Android malware spies on dissidents by stealing 2FA codes

Iranian hackers’ Android malware spies on dissidents by stealing 2FA codes




It’s no secret that some countries have spied on their citizens through innocuous-looking apps, but one effort is more extensive than usual. Check Point Research has discovered (via ZDNet) that Rampant Kitten, an Iranian hacker group that has targeted the country’s political opponents for years, has developed Android malware focused on stealing two-factor authentication codes. It isn’t just focused on any one service, either — it targets Google, Telegram, and other major internet or social services.The attackers first use a phishing trojan to collect login details, and then try those with the real site. If the victim has two-factor authentication turned on, the newly-reported malware intercepts the incoming SMS messages and quietly sends copies to the intruders.


ADVERTISEMENTS



Share This on Facebook

Up Next:
Verizon's $30 Unlimited Plus tablet plan offers 5G access

Verizon's $30 Unlimited Plus tablet plan offers 5G access

Verizon (Engadget’s parent company) has introduced a new plan for tablets, hotspots, smartwatches and laptops that’ll give you access to its 5G Ultra Wideband network, provided you have a device that supports it. The Unlimited Plus plan expands upon the carrier’s old Unlimited plan and includes double the LTE data allowance. While the standar... Read More



Related Topics: