About: Dark Caracal     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : owl:Thing, within Data Space : dbpedia.org associated with source document(s)
QRcode icon
http://dbpedia.org/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FDark_Caracal&graph=http%3A%2F%2Fdbpedia.org&graph=http%3A%2F%2Fdbpedia.org

Dark Caracal is a spyware campaign that has been conducted by an unknown group of hackers since at least 2012. The campaign was discovered by the Electronic Frontier Foundation and the mobile security firm , who published their findings on January 18, 2018. The campaign has mainly used phishing attacks (and in some cases physical access to victims systems) in order to install malicious Android applications, including ones that imitate the look and feel of popular instant messaging applications, on victims systems to gain full control over the devices. No evidence was found that iPhone users have been targeted, and according to Google, none of the malicious applications were found on the Google Play Store. The data allegedly stolen includes documents, call records, text messages, audio reco

AttributesValues
rdfs:label
  • Dark Caracal (en)
rdfs:comment
  • Dark Caracal is a spyware campaign that has been conducted by an unknown group of hackers since at least 2012. The campaign was discovered by the Electronic Frontier Foundation and the mobile security firm , who published their findings on January 18, 2018. The campaign has mainly used phishing attacks (and in some cases physical access to victims systems) in order to install malicious Android applications, including ones that imitate the look and feel of popular instant messaging applications, on victims systems to gain full control over the devices. No evidence was found that iPhone users have been targeted, and according to Google, none of the malicious applications were found on the Google Play Store. The data allegedly stolen includes documents, call records, text messages, audio reco (en)
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
Link from a Wikipage to an external page
sameAs
dbp:wikiPageUsesTemplate
has abstract
  • Dark Caracal is a spyware campaign that has been conducted by an unknown group of hackers since at least 2012. The campaign was discovered by the Electronic Frontier Foundation and the mobile security firm , who published their findings on January 18, 2018. The campaign has mainly used phishing attacks (and in some cases physical access to victims systems) in order to install malicious Android applications, including ones that imitate the look and feel of popular instant messaging applications, on victims systems to gain full control over the devices. No evidence was found that iPhone users have been targeted, and according to Google, none of the malicious applications were found on the Google Play Store. The data allegedly stolen includes documents, call records, text messages, audio recordings, secure messaging client content, browsing history, contact information, photos, location data, and other information that allows the group to identify their targets and have a look at their personal lives. The component used to monitor Android devices is known as Pallas; the component used to monitor Windows devices is a variant of the . The campaign is suspected to be state-sponsored and linked to the Lebanese government's General Directorate of General Security. According to Reuters, "the researchers found technical evidence linking servers used to control the attacks to a GDGS office in Beirut by locating wi-fi networks and internet protocol address in or near the building." The researchers have said that they are not certain "whether the evidence proves GDGS is responsible or is the work of a rogue employee." The report was denied by Major General Abbas Ibrahim. (en)
prov:wasDerivedFrom
page length (characters) of wiki page
foaf:isPrimaryTopicOf
is Link from a Wikipage to another Wikipage of
is foaf:primaryTopic of
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 59 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software