Basecamp for Android app allowed to trigger Javascript interface via WebView that would then provide access to Java native code (Bounty - $1,210)
https://hackerone.com/reports/1343300
https://hackerone.com/reports/1343300
HackerOne
Basecamp disclosed on HackerOne: com.basecamp.bc3 Webview...
It was identified that the android **com.basecamp.bc3 application**, contains a Webview where the loaded URLs are not sanitised properly. As this webview's functionality is extended via javascript...
๐8
Vulnerabilities discovered in Android and iOS WhatsApp could have caused remote code execution when receiving a crafted video file (CVE-2022-27492) and remote code execution in an established video call (CVE-2022-36934)
https://www.whatsapp.com/security/advisories/2022/
https://www.whatsapp.com/security/advisories/2022/
WhatsApp.com
WhatsApp Security Advisories 2022
WhatsApp Security Advisories 2022 - List of security fixes for WhatsApp products
๐16๐9๐1๐1
Mobile App Penetration Testing Cheat Sheet
https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet
https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet
GitHub
GitHub - tanprathan/MobileApp-Pentest-Cheatsheet: The Mobile App Pentest cheat sheet was created to provide concise collectionโฆ
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics. - tanprathan/MobileApp-Pentest-Chea...
๐27๐ฅฐ1
[0x04] Reversing Shorts :: Finding and Backtracing Signal Messages on Android
https://youtu.be/oy0mn5CV-ro
https://youtu.be/oy0mn5CV-ro
YouTube
[0x04] Reversing Shorts :: Finding and Backtracing Signal Messages on Android
Tracing and backtracing works quite different on Android when compared to iOS. We'll take a look into how to list all Java classes with Frida, how to trace then, and how to generate a Java backtrace from inside the JVM. With an Android Studio virtual phoneโฆ
๐19
Discovered ad fraud scheme called - Scylla - that targeted SKDs in apps available on both Googleโs Play Store and Appleโs App Store and generated over 13+ million downloads
https://www.humansecurity.com/learn/blog/poseidons-offspring-charybdis-and-scylla
https://www.humansecurity.com/learn/blog/poseidons-offspring-charybdis-and-scylla
HUMAN Security
Poseidonโs Offspring: Charybdis and Scylla - HUMAN Security
HUMAN's Satori Threat Intelligence and Research Team uncovered a network of 89 Android and iOS apps committing various flavors of ad fraud.
๐7๐ฅ2
Analysis of a 7-year mobile surveillance campaign targeting largest minority in China conducted by Scarlet Mimic hacking group
https://blog.checkpoint.com/2022/09/22/cpr-analyzes-a-7-year-mobile-surveillance-campaign-targeting-largest-minority-in-china/
https://blog.checkpoint.com/2022/09/22/cpr-analyzes-a-7-year-mobile-surveillance-campaign-targeting-largest-minority-in-china/
Check Point Blog
CPR analyzes A 7-year mobile surveillance campaign targeting largest minority in China - Check Point Blog
Highlights: Check Point Research (CPR) examines a long running mobile surveillance campaign, targeting the largest minority in China- the Uyghurs. The
๐7
Technical analysis of Alien Android malware
https://muha2xmad.github.io/malware-analysis/alien/
https://muha2xmad.github.io/malware-analysis/alien/
muha2xmad
Technical analysis of Alien android malware
ุจุณู
ุงููู ุงูุฑุญู
ู ุงูุฑุญูู
๐11โค3
Harly: another Trojan subscriber on Google Play
https://www.kaspersky.com/blog/harly-trojan-subscriber/45573/
https://www.kaspersky.com/blog/harly-trojan-subscriber/45573/
Kaspersky
The Harly Trojan subscriber in Google Play apps
A slew of apps containing the Harly Trojan subscriber have been found on Google Play, adding up to more than 4.8 million downloads. We explain why these apps are dangerous.
๐10โค1
Mitigate security risks in your Android app
https://developer.android.com/topic/security/risks
https://developer.android.com/topic/security/risks
Android Developers
Mitigate security risks in your app | App quality | Android Developers
๐20
A Technical Analysis of Pegasus for Android โ Part 2
https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-2/
https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-2/
๐26๐ฅ5
Heap buffer overflow in Android 12 Can Cause Chrome Sandbox Escape to system privilege
https://bugs.chromium.org/p/chromium/issues/detail?id=1283640
https://bugs.chromium.org/p/chromium/issues/detail?id=1283640
๐18
Analyze iOS kernel with free tools
youtu.be/HReVZH9fMcc
youtu.be/HReVZH9fMcc
YouTube
[0x05] Reversing Shorts :: iOS Kernel Demystified
The XNU kernel is essential to iOS and macOS security. In this video, we'll take a look into Apple's open-source releases as well as free tools to analyze closed-source extensions.
Full playlist of reversing shorts: https://www.youtube.com/playlist?listโฆ
Full playlist of reversing shorts: https://www.youtube.com/playlist?listโฆ
๐13๐5
New Pegasus Spyware Abuses Identified in Mexico
https://citizenlab.ca/2022/10/new-pegasus-spyware-abuses-identified-in-mexico/
https://citizenlab.ca/2022/10/new-pegasus-spyware-abuses-identified-in-mexico/
The Citizen Lab
New Pegasus Spyware Abuses Identified in Mexico
Mexican digital rights organization R3D, with technical support from the Citizen Lab, has determined that Mexican journalists and a human rights defender were infected with Pegasus between 2019 and 2021. The infections occurred years after the first revelationsโฆ
๐18๐ฅ3โค1๐1๐1
Pixel6: Booting up
https://eshard.com/posts/pixel6_bootloader
https://eshard.com/posts/pixel6_bootloader
๐15
Analysis of the Pixel 6 bootloader: Emulation, ROP
https://eshard.com/posts/pixel6bootloader-2
https://eshard.com/posts/pixel6bootloader-2
๐16
RatMilad - New Android Spyware impersonating virtual phone numbers
https://blog.zimperium.com/we-smell-a-ratmilad-mobile-spyware/
https://blog.zimperium.com/we-smell-a-ratmilad-mobile-spyware/
๐8๐ฅ8
Meta identified more than 400 malicious Android and iOS apps that steal Facebook login information #FaceStealer
https://about.fb.com/news/2022/10/protecting-people-from-malicious-account-compromise-apps/
https://about.fb.com/news/2022/10/protecting-people-from-malicious-account-compromise-apps/
Meta Newsroom
Protecting People From Malicious Account Compromise Apps
More than 400 malicious Android and iOS apps this year targeted people to steal their Facebook login information.
๐13๐ฅฐ6๐1
Fuzzing Host-to Guest Attack Surface in Android Protected KVM
https://youtu.be/cJjjlSG6JEA
https://youtu.be/cJjjlSG6JEA
YouTube
Fuzzing Host-to Guest Attack Surface in Android Protected KVM- Eugene Rodionov & Will Deacon, Google
Fuzzing Host-to Guest Attack Surface in Android Protected KVM - Eugene Rodionov & Will Deacon, Google
Android 13 introduces native support of virtualization services built on top of Protected KVM (pKVM) for arm64 devices. Unlike in traditional KVM whereโฆ
Android 13 introduces native support of virtualization services built on top of Protected KVM (pKVM) for arm64 devices. Unlike in traditional KVM whereโฆ
๐14๐1
Malicious WhatsApp mod distributed through legitimate apps such as Vidmate and Snaptube
https://securelist.com/malicious-whatsapp-mod-distributed-through-legitimate-apps/107690/
https://securelist.com/malicious-whatsapp-mod-distributed-through-legitimate-apps/107690/
Securelist
Malicious WhatsApp mod distributed through legitimate apps
The malicious version of YoWhatsApp messenger, containing Triada trojan, was spreading through ads in the popular Snaptube app and the Vidmate app's internal store.
๐15
Forwarded from The Bug Bounty Hunter
MOBILE PENTESTING 101 โ BYPASSING BIOMETRIC AUTHENTICATION
https://securitycafe.ro/2022/09/05/mobile-pentesting-101-bypassing-biometric-authentication/
https://securitycafe.ro/2022/09/05/mobile-pentesting-101-bypassing-biometric-authentication/
Security Cafรฉ
Mobile Pentesting 101 โ Bypassing Biometric Authentication
Android and iOS Fingerprint bypassing techniques. The article presents multiple biometric bypass methods, including Frida and objection.
๐17
TOAD attacks: Vishing combined with Android banking malware now targeting Italian banks
https://www.threatfabric.com/blogs/toad-fraud.html
https://www.threatfabric.com/blogs/toad-fraud.html
ThreatFabric
TOAD attacks: Vishing combined with Android banking malware now targeting Italian banks
ThreatFabricโs analysts uncovered a network of phishing websites targeting Italian online-banking users and aiming to steal their banking credentials.
๐15