![]() The researchers found Hyperscraper in December 2021 and analyzed it using a test Gmail account. Google TAG attributes the tool to Charming Kitten, an Iranian-backed group that is also known as APT35 and Phosphorus, and says that the earliest sample they found dates from 2020. In a technical report today, researchers from Google's Threat Analysis Group (TAG) share details about Hyperscraper’s functionality and say that it is under active development. The name of the utility is Hyperscraper and like many of the threat actor’s tools and operations, it is far from sophisticated.īut its lack of technical complexity is balanced by effectiveness, allowing the hackers to steal a victim’s inbox without leaving many hints of the intrusion. ![]() State-sponsored Iranian hacking group Charming Kitten has been using a new tool to download email messages from targeted Gmail, Yahoo, and Microsoft Outlook accounts.
0 Comments
Leave a Reply. |