Fake Android Money Transfer App Targeting Bengali-Speaking Users
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/fake-android-money-transfer-app-targeting-bengali-speaking-users/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/fake-android-money-transfer-app-targeting-bengali-speaking-users/
McAfee Blog
Fake Android Money Transfer App Targeting Bengali-Speaking Users | McAfee Blog
Authored by Dexter Shin McAfeeβs Mobile Research Team discovered a new and active Android malware campaign targeting Bengali-speaking users, mainly
π7
RaspyJack
Turn a Raspberry Pi Zero 2 W + Waveshare 1.44β³ LCD into a pocket-sized, SharkJack-style network multitool.
Key features:
β’ Recon: Multi-profile Nmap scans
β’ Shells: Reverse-shell launcher (pick IP on the fly or use a preset)
β’ Creds Capture: Responder, ARP MITM + sniff, DNS-spoof phishing
β’ Loot Viewer: Read Nmap / Responder / DNSSpoof logs on the screen
https://github.com/7h30th3r0n3/Raspyjack
Turn a Raspberry Pi Zero 2 W + Waveshare 1.44β³ LCD into a pocket-sized, SharkJack-style network multitool.
Key features:
β’ Recon: Multi-profile Nmap scans
β’ Shells: Reverse-shell launcher (pick IP on the fly or use a preset)
β’ Creds Capture: Responder, ARP MITM + sniff, DNS-spoof phishing
β’ Loot Viewer: Read Nmap / Responder / DNSSpoof logs on the screen
https://github.com/7h30th3r0n3/Raspyjack
π₯18β€8
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
https://zimperium.com/blog/konfety-returns-classic-mobile-threat-with-new-evasion-techniques
https://zimperium.com/blog/konfety-returns-classic-mobile-threat-with-new-evasion-techniques
Zimperium
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
true
β€8π1
Keyboard Input Injection vulnerability in Air Keyboard iOS App Still Unpatched
https://www.mobile-hacker.com/2025/07/17/remote-input-injection-vulnerability-in-air-keyboard-ios-app-still-unpatched/
https://www.mobile-hacker.com/2025/07/17/remote-input-injection-vulnerability-in-air-keyboard-ios-app-still-unpatched/
β€9π2π1
Remote Code Execution Discovered in XTool AnyScan App: Risks to Phones and Vehicles
https://www.nowsecure.com/blog/2025/07/16/remote-code-execution-discovered-in-xtool-anyscan-app-risks-to-phones-and-vehicles/
https://www.nowsecure.com/blog/2025/07/16/remote-code-execution-discovered-in-xtool-anyscan-app-risks-to-phones-and-vehicles/
Nowsecure
Remote Code Execution Discovered in XTool AnyScan App: Risks to Phones and Vehicles - NowSecure
Learn how NowSecure has identified an app whose developers violated security guidelines, bypassing recommended procedures exposing systems to remote control.
β€6π1π΄1
This media is not supported in your browser
VIEW IN TELEGRAM
Sending bitcoin over Bluetooth between Bitchat Android and iPhone. Both have a native cashu ecash wallet built in.
The ecash travels directly from phone to phone. the sender needs no internet. It is instant and untraceable digital cash.
The ecash travels directly from phone to phone. the sender needs no internet. It is instant and untraceable digital cash.
π34π12π€¨7β€4π₯3π3β‘1π₯°1π€1π1
How To Turn Old Android Smartphone into Travel Router With NAS
https://www.mobile-hacker.com/2025/07/21/how-to-turn-old-android-smartphone-into-travel-router-with-nas/
https://www.mobile-hacker.com/2025/07/21/how-to-turn-old-android-smartphone-into-travel-router-with-nas/
Mobile Hacker
How To Turn Old Android Smartphone into Travel Router With NAS Mobile Hacker
Itβs not perfect, but it worksβa clever DIY project that blends portability, privacy, and practicality.
π10β€6π2
Android Misconfiguration Leading to Task Hijacking in Caller ID app with 10M+ installs (CVE-2025-7889) + demo
https://github.com/KMov-g/androidapps/blob/main/caller.id.phone.number.block.md
https://github.com/KMov-g/androidapps/blob/main/caller.id.phone.number.block.md
GitHub
androidapps/caller.id.phone.number.block.md at main Β· KMov-g/androidapps
Contribute to KMov-g/androidapps development by creating an account on GitHub.
π10β€7
Lookout Discovers Massistant Chinese Mobile Forensic Tooling
https://www.lookout.com/threat-intelligence/article/massistant-chinese-mobile-forensics
https://www.lookout.com/threat-intelligence/article/massistant-chinese-mobile-forensics
Lookout
Lookout Discovers Massistant Chinese Mobile Forensic Tooling | Threat Intel
Massistant is a mobile forensics application used by law enforcement in China to collect extensive information from mobile devices.
π6β€1
Unmasking Malicious APKs: Android Malware Blending Click Fraud and Credential Theft
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/unmasking-malicious-apks-android-malware-blending-click-fraud-and-credential-theft/
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/unmasking-malicious-apks-android-malware-blending-click-fraud-and-credential-theft/
Levelblue
Unmasking Malicious APKs: Android Malware Blending Click Fraud and Credential Theft
Malicious APKs (Android Package Kit files) continue to serve as one of the most persistent and adaptable delivery mechanisms in mobile threat campaigns.
π6
Lookout Discovers Iranian APT MuddyWater Leveraging DCHSpy During Israel-Iran Conflict
https://www.lookout.com/threat-intelligence/article/lookout-discovers-iranian-dchsy-surveillanceware
https://www.lookout.com/threat-intelligence/article/lookout-discovers-iranian-dchsy-surveillanceware
Lookout
Lookout Discovers MuddyWater Leveraging DCHSpy For Israel-Iran Conflict | Threat Intel
Lookout discovered four new samples of DCHSpy one week after the start of the Israel-Iran conflict. It is likely developed and maintained by MuddyWater, part of Iran's MOIS
π11β€4
Deobfuscating Android Apps with Androidmeda LLM: A Smarter Way to Read Obfuscated Code
β As a bonus, example of deobfuscating Crocodilus Malware
https://www.mobile-hacker.com/2025/07/22/deobfuscating-android-apps-with-androidmeda-a-smarter-way-to-read-obfuscated-code/
β As a bonus, example of deobfuscating Crocodilus Malware
https://www.mobile-hacker.com/2025/07/22/deobfuscating-android-apps-with-androidmeda-a-smarter-way-to-read-obfuscated-code/
β€15π5π3π1
Insecure authentication due to missing brute-force protection and runtime manipulation in Two App Studio Journey v5.5.9 for iOS (CVE-2025-41459)
Journey is a journaling app for iOS that stores personal entries and media
https://cirosec.de/en/news/vulnerability-in-two-app-studio-journey/
Journey is a journaling app for iOS that stores personal entries and media
https://cirosec.de/en/news/vulnerability-in-two-app-studio-journey/
cirosec
Vulnerability in Two App Studio Journey (CVE-2025-41459) - cirosec
July 21, 2025 - Journey is a journaling app for iOS that stores personal entries and media.
π7β€4
The Dark Side of Romance: SarangTrap Extortion Campaign
https://zimperium.com/blog/the-dark-side-of-romance-sarangtrap-extortion-campaign
https://zimperium.com/blog/the-dark-side-of-romance-sarangtrap-extortion-campaign
Zimperium
The Dark Side of Romance: SarangTrap Extortion Campaign
true
π9π3
π¨ Meet Guardio - a powerful online protection tool that keeps you safe while you browse, shop, and live your digital life.
β Blocks scam sites, phishing & malicious pop-ups
β Alerts you instantly if your personal info or SSN is leaked
β Protects your identity, accounts & mobile in real-time
π Try it FREE for 7 days β plus get up to 72% discount! Give it a try now
β Blocks scam sites, phishing & malicious pop-ups
β Alerts you instantly if your personal info or SSN is leaked
β Protects your identity, accounts & mobile in real-time
π Try it FREE for 7 days β plus get up to 72% discount! Give it a try now
π25π€‘10β€3π©3π2π1π1
Debugging the Pixel 8 kernel via KGDB
How to use GDB over a serial connection for debugging the kernel on a Pixel 8
https://xairy.io/articles/pixel-kgdb
How to use GDB over a serial connection for debugging the kernel on a Pixel 8
https://xairy.io/articles/pixel-kgdb
β€17π3π₯2π1
RedHook: A New Android Banking Trojan Targeting Users in Vietnam
https://cyble.com/blog/redhook-new-android-banking-targeting-in-vietnam/
https://cyble.com/blog/redhook-new-android-banking-targeting-in-vietnam/
Cyble
RedHook: A New Android Banking Trojan Targeting Users In Vietnam
RedHook is a new Android banking trojan targeting Vietnamese users via phishing sites posing as trusted financial and government institutions.
π8β€1
ToxicPanda: The Android Banking Trojan Targeting Europe
https://www.bitsight.com/blog/toxicpanda-android-banking-malware-2025-study
https://www.bitsight.com/blog/toxicpanda-android-banking-malware-2025-study
Bitsight
ToxicPanda Malware in 2025 | Bitsight TRACE Threat Research
What is ToxicPanda? Bitsight Trace dives into detail on the banking malware, from impact breadth, delivery, technical analysis, and more. Learn more now.
π14π€©3