Flying Kitten is a threat actor that has been tracked and reported on since mid-January 2014, primarily by CrowdStrike Intelligence. The group first came to prominence in November 2013 with its cyber-attack using the domain xn--facebook-06k.com. It continued its malicious activities in March 2014 through drive.yahoomail.com.co. Over time, Flying Kitten targeted multiple U.S.-based defense contractors and political dissidents, marking a new phase of its operations with a series of credential theft attempts observed in September 2013 using the domain "qooqle.com[.]co."
The group's toolkit was simple yet effective, involving malware agents like "Stealer," a straightforward keylogger with an easy-to-use builder application. This toolkit was either repurposed or experimented with by another threat actor, Rocket Kitten, which showed striking similarities to Flying Kitten's operations. In fact, Rocket Kitten used tools from Flying Kitten for credential theft, revealing more than superficial commonalities between the two groups.
By August 2014, both Flying Kitten and Rocket Kitten appeared to have disbursed. However, there were indications that Rocket Kitten had direct access to Flying Kitten's tools. One notable addition to the Ishak codebase related to logging and authentication wasn't previously seen in Flying Kitten's kit. This suggests that Rocket Kitten may have evolved from Flying Kitten's operations, incorporating new techniques and strategies in their attacks. Despite these developments, the core of Flying Kitten's toolkit remained relatively simple, storing victim identifiers as an array in a file, essentially creating a phone book for the platform.
Description last updated: 2024-05-05T02:07:11.659Z