top of page
Search
Writer's pictureStormsec

Bitter APT group using Dracarys Android Spyware

Researchers from Cyble Research Labs have identified the Bitter APT group delivering Android Spyware “Dracarys” to users of the Signal messaging app, also known as Signal.




ADVERSARY: Bitter


TARGETED COUNTRIES: Singapore, Australia, Georgia, Pakistan, China, India


MALWARE FAMILIES: Bitter, Dracarys Android


ATT&CK IDS: T1476 - Deliver Malicious App via Other Means, T1444 - Masquerade as Legitimate Application, T1412 - Capture SMS Messages, T1432 - Access Contact List, T1433 - Access Call Log, T1517 - Access Notifications, T1533 - Data from Local System, T1429 - Capture Audio, T1437 - Standard Application Layer Protocol


Read More:

9 views

Comments


Commenting has been turned off.
bottom of page