Source: National Cyber Security – Produced By Gregory Evans
Rocket Kitten is a hacking group that first appeared in April 2014 and was unmasked for the first time by FireEye researchers in May 2014. The most damning report on their activity was published this year by a joint effort betweenTREND MICRO & ClearSky. Since their first appearance, the group’s main targets were individuals and institutions that opposed or criticized the Iranian government. As both the original Trend Micro & ClearSky report and the latest Check Point findings show, the group’s MO included launching spear-phishing campaigns against its targets, using social engineering tactics, and then infecting the victims’ computers withMALWARE. Their tactics never evolved past this point, but only made small tweaks to their operations’ code to avoid detection bySECURITY TOOLS. In spite of the fact that Rocket Kitten was ousted this September, Check Point reveals that the state-sponsored hackers continued their operations regardless, making tiny changes to their malicious code and continuing to operate like nothing happened. Check Point researchers got their hands on a phishing server used by Rocket Kitten This was confirmed when Check Point researchers uncovered one of the group’s phishing servers left unprotected online. Siphoning information from the aforementioned server, security researchers managed to build […]
For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com
The post Security Researchers Breach Phishing Server Belonging to Iranian Hackers Rocket Kitten appeared first on National Cyber Security.
View full post on National Cyber Security