Bouncing Golf

Threat Actor updated 3 months ago (2024-11-29T14:02:21.975Z)
Download STIX
Preview STIX
"Bouncing Golf" is a threat actor group that has been observed infecting over 660 Android devices with a malware named GolfSpy, which has wide-ranging cyberespionage capabilities. The name "Bouncing Golf" was derived from the malware's code in the package named "golf." This group repackages legitimate apps with this malware, making it difficult for users to distinguish between the original and compromised versions. The malware, detected as AndroidOS_GolfSpy.HRX by Trend Micro, is notable for its extensive range of cyberespionage capabilities. There is evidence suggesting a connection between Bouncing Golf and another threat actor group known as Domestic Kitten. This is based on similarities in their coding structures, specifically the decoding algorithm and the use of "" as a separator in their command strings. Furthermore, the data targeted by Domestic Kitten’s malware for theft follows a similar format to that of Bouncing Golf's, each type of data being identified by a unique character. The operators behind Bouncing Golf are also known to cover their tracks effectively, adding an extra layer of complexity to the task of mitigating their activities. Continuous monitoring of Bouncing Golf's Command and Control (C&C) related activities has revealed that the campaign has already affected more than 660 devices. Given these factors, it's clear that Bouncing Golf poses a significant cybersecurity threat, particularly to Android device users.
Description last updated: 2024-05-05T13:57:06.424Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Bouncing Golf Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago