Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/
McAfee Blog
Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea | McAfee Blog
Authored by SangRyol Ryu McAfeeโs Mobile Research Team discovered a software library weโve named Goldoson, which collects lists of applications installed,
๐8๐1
Chameleon: A New Android Malware Spotted In The Wild
https://blog.cyble.com/2023/04/13/chameleon-a-new-android-malware-spotted-in-the-wild/
https://blog.cyble.com/2023/04/13/chameleon-a-new-android-malware-spotted-in-the-wild/
๐12๐ค1
Kyocera Android printing app is vulnerable to improper intent handling and can be abused to drop malware (CVE-2023-25954)
https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2023-04-11.html
https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2023-04-11.html
Kyoceradocumentsolutions
KYOCERA Mobile Print for Android Security Vulnerability | KYOCERA Document Solutions
Security information of Kyocera Document Solutions Inc.
๐9
Android Malware Analysis of Chameleon banking trojan
Part 1: https://n0psn0ps.github.io/2023/03/02/android-malware-analysis-series-ato.apk-part-3.1/
Part 2: https://n0psn0ps.github.io/2023/04/13/android-malware-analysis-series-ato.apk-part-3.2/
Part 1: https://n0psn0ps.github.io/2023/03/02/android-malware-analysis-series-ato.apk-part-3.1/
Part 2: https://n0psn0ps.github.io/2023/04/13/android-malware-analysis-series-ato.apk-part-3.2/
n0ps
Android Malware Analysis Series - ATO.apk - Part 3.1
Permanent dark(er) theme for Poole
๐16
Uncovering Security Vulnerabilities in Smart Ray-Ban Sunglasses
https://code-byter.com/2023/04/16/rayban-hacking.html
https://code-byter.com/2023/04/16/rayban-hacking.html
๐9
Getting root on an Android 12 emulated device with Google Services
https://markuta.com/rooted-android-12-emulator/
https://markuta.com/rooted-android-12-emulator/
Markuta
Getting root on an Android 12 emulated device with Google Services
A short blog on how to get root on an emulated device running Android 12 with rootAVD.
๐8โค3๐ฏ2๐ฅ1
Mobile Exploitation, the past, present, and future [slides]
https://github.com/externalist/presentations/blob/master/2023%20Zer0con/Mobile%20Exploitation%2C%20the%20past%2C%20present%2C%20and%20future.pdf
https://github.com/externalist/presentations/blob/master/2023%20Zer0con/Mobile%20Exploitation%2C%20the%20past%2C%20present%2C%20and%20future.pdf
GitHub
presentations/2023 Zer0con/Mobile Exploitation, the past, present, and future.pdf at master ยท externalist/presentations
Some presentations I did in the past. Contribute to externalist/presentations development by creating an account on GitHub.
๐8
A Nexi phishing campaign spread malicious app via official Google Play Store
https://www.d3lab.net/a-nexi-phishing-campaign-spread-malicious-app-via-official-google-play-store/
https://www.d3lab.net/a-nexi-phishing-campaign-spread-malicious-app-via-official-google-play-store/
D3Lab
A Nexi phishing campaign spread malicious App via official Google Play Store
A malicious application present in the official Google Play Store was spread through a Italian Nexi Phishing campaign. The intent was to capture 2FA tokens.
๐10๐ฅ2๐ค2โค1
Attacking McAfee VPN Android App
https://blog.scrt.ch/2023/03/29/attacking-android-antivirus-applications/
https://blog.scrt.ch/2023/03/29/attacking-android-antivirus-applications/
๐7
How to unpack protected Android APK with Frida
Tutorial: https://youtu.be/PLX8_z0EmGw
Scripts: https://github.com/fatalSec/unpacking-APK
Tutorial: https://youtu.be/PLX8_z0EmGw
Scripts: https://github.com/fatalSec/unpacking-APK
YouTube
How to Unpack Protected Android APK with Frida
#androidpentest #dexdump #frida #apkunpacking #memdump
In this video we unpacked an APK file named AntiSplit-G2. All the classes in this application are protected using some kind of protector and the classes gets extracted into the memory as a de file byโฆ
In this video we unpacked an APK file named AntiSplit-G2. All the classes in this application are protected using some kind of protector and the classes gets extracted into the memory as a de file byโฆ
๐12โค4
DoNot APT Targets Individuals in South Asia using Android Malware
https://www.cyfirma.com/outofband/donot-apt-targets-individuals-in-south-asia-using-android-malware/
https://www.cyfirma.com/outofband/donot-apt-targets-individuals-in-south-asia-using-android-malware/
CYFIRMA
DoNot APT Targets Individuals in South Asia using Android Malware - CYFIRMA
EXECUTIVE SUMMARY Recently CYFIRMA observed a cyber-attack on an individual residing in Kashmir, India. CYFIRMA research team collected two pieces...
๐16
DAAM Android Botnet being distributed through Trojanized Applications
https://blog.cyble.com/2023/04/20/daam-android-botnet-being-distributed-through-trojanized-applications/
https://blog.cyble.com/2023/04/20/daam-android-botnet-being-distributed-through-trojanized-applications/
Cyble
DAAM Botnet Spread Via Trojanized Android Apps
Discover how Cyble Research & Intelligence Labs analyzes Trojanized Android apps distributing the DAAM botnet, including a malicious Psiphon variant.
๐9โค2
The Fuzzing Guide to the Galaxy: An Attempt with Android System Services
https://blog.thalium.re/posts/fuzzing-samsung-system-services/
https://blog.thalium.re/posts/fuzzing-samsung-system-services/
THALIUM
The Fuzzing Guide to the Galaxy: An Attempt with Android System Services
Although the Android base is open source, many different constructors customize it with their own UIs and APIs. All these additions represent an extra attack surface that can change from one phone model to another. We tried to automatically fuzz the closedโฆ
๐9
Fakecalls Android Malware Abuses Legitimate Signing Key
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/fakecalls-android-malware-abusing-legitimate-signing-key/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/fakecalls-android-malware-abusing-legitimate-signing-key/
McAfee Blog
Fakecalls Android Malware Abuses Legitimate Signing Key | McAfee Blog
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate apps in South Korea last year.
๐19โค2
HiddenAds Spread via Android Gaming Apps on Google Play
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/hiddenads-spread-via-android-gaming-apps-on-google-play/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/hiddenads-spread-via-android-gaming-apps-on-google-play/
McAfee Blog
HiddenAds Spread via Android Gaming Apps on Google Play | McAfee Blog
Authored by Dexter Shin Minecraft is a popular video game that can be played on a desktop or mobile. This is a sandbox game developed by Mojang Studios.
๐13๐ฅฑ1
Mobile Hacking Cheatsheets
Android and iOS pentesting, forensics, debugging and fuzzing cheatsheets
https://github.com/randorisec/MobileHackingCheatSheet/tree/master/pdf
Android and iOS pentesting, forensics, debugging and fuzzing cheatsheets
https://github.com/randorisec/MobileHackingCheatSheet/tree/master/pdf
๐41๐ฅ3โค2๐ค1
Google Play Store bad apps and developers review in 2022
-blocked 1.43 million apps to be available on the Store
-banned 173K bad accounts
-prevented 500K submitted apps from unnecessarily accessing sensitive permissions over the past 3 years
-expanded the App Defense Alliance (McAfee, Trend Micro, ESET, Lookout, Zimperium)
https://security.googleblog.com/2023/04/how-we-fought-bad-apps-and-bad-actors.html
-blocked 1.43 million apps to be available on the Store
-banned 173K bad accounts
-prevented 500K submitted apps from unnecessarily accessing sensitive permissions over the past 3 years
-expanded the App Defense Alliance (McAfee, Trend Micro, ESET, Lookout, Zimperium)
https://security.googleblog.com/2023/04/how-we-fought-bad-apps-and-bad-actors.html
Google Online Security Blog
How we fought bad apps and bad actors in 2022
Posted by Anu Yamunan and Khawaja Shams (Android Security and Privacy Team), and Mohet Saxena (Compute Trust and Safety) Keeping Google P...
๐10๐ค4โค1