Thank you for your interest in Lookout

Dark Caracal Technical Report

Dark Caracal

Read this report to learn:

  • Details on more than 90 indicators of compromise (IOC) associated with Dark Caracal including 11 different Android malware IOCs; 26 desktop malware IOCs across Windows, Mac, and Linux; and 60 domain/IP based IOCs
  • The identities and attacker personas behind Dark Caracal
  • A timeline of Dark Caracal’s activities
  • Dark Caracal’s social engineering and spear-phishing techniques
  • Infrastructure details

Find out how to bring mobile security and phishing protection to your enterprise today.

Contact Sales call_made


Gartner insights: four mobile security recommendations for CISOs

In the past year, Gartner has provided guidance on the differences between Enterprise Mobility...

Analyst Report Download summary


Why mobile risk is bigger than bad apps, phishing, and malware

In this data-based report, you'll benefit from a comprehensive overview of the real-world risk...

Whitepaper Read Research Report


Mobile Phishing: Myths and facts facing every modern enterprise today

Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is...

Whitepaper Download Whitepaper