ASLR & the iOS Kernel — How virtual address spaces are randomised
https://bellis1000.medium.com/aslr-the-ios-kernel-how-virtual-address-spaces-are-randomised-d76d14dc7ebb
https://bellis1000.medium.com/aslr-the-ios-kernel-how-virtual-address-spaces-are-randomised-d76d14dc7ebb
Medium
ASLR & the iOS Kernel — How virtual address spaces are randomised
In this blog post I wanted to take a look at ASLR and how the iOS kernel implements it for user-space processes.
Deep Dive into an Obfuscation-as-a-Service for Android Malware
https://www.stratosphereips.org/blog/2020/12/03/deep-dive-into-an-obfuscation-as-a-service-for-android-malware
https://www.stratosphereips.org/blog/2020/12/03/deep-dive-into-an-obfuscation-as-a-service-for-android-malware
Stratosphere Laboratory
Deep Dive into an Obfuscation-as-a-Service for Android Malware — Stratosphere Laboratory
While confined in our homes studying the interactions of individuals involved in the spread of the Android banking Trojan botnet (known as Geost), we encountered a unique opportunity: investigate an automated obfuscation-as-a-service platform for Android…
More than 20 million Gionee phones secretly implanted with Trojan Horses to make money
https://www.gizmochina.com/2020/12/05/more-than-20-million-gionee-phones-secretly-implanted-with-trojan-horses-to-make-money/
https://www.gizmochina.com/2020/12/05/more-than-20-million-gionee-phones-secretly-implanted-with-trojan-horses-to-make-money/
Gizmochina
More than 20 million Gionee phones secretly implanted with Trojan Horses to make money
Recently, the China Judgment Document Network published a verdict on the illegal control of computer information systems found to have been executed on Gionee phones. According to the court details, more than 20 million Gionee phones were intentionally inflicted…
Rana Android malware family, attributed by the US government to the Iran-linked APT39 group (also known as Chafer, Cadelspy, Remexi, and ITG07)
https://blog.reversinglabs.com/blog/rana-android-malware
https://blog.reversinglabs.com/blog/rana-android-malware
ReversingLabs
Rana Android Malware
Your past catches up, sooner or later...
Microsoft Edge for Android Spoofing Vulnerability (CVE-2020-17153)
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17153
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17153
Cellebrite’s New Solution for Decrypting the Signal App
http://web.archive.org/web/20201210150311/https://www.cellebrite.com/en/blog/cellebrites-new-solution-for-decrypting-the-signal-app/
http://web.archive.org/web/20201210150311/https://www.cellebrite.com/en/blog/cellebrites-new-solution-for-decrypting-the-signal-app/
Bypass antiroot detection for Xamarin apps using Frida
https://codeshare.frida.re/@Gand3lf/xamarin-antiroot/
https://codeshare.frida.re/@Gand3lf/xamarin-antiroot/
Decrypting File encrypted by Monaca Plugin
http://blog.rz.my/2020/12/decrypting-monaca-encrypt-plugin.html
http://blog.rz.my/2020/12/decrypting-monaca-encrypt-plugin.html
blog.rz.my
Decrypting File encrypted by Monaca Plugin
New Spyware Used by Sextortionists to Blackmail iOS and Android Users
https://blog.lookout.com/lookout-discovers-new-spyware-goontact-used-by-sextortionists-for-blackmail
https://blog.lookout.com/lookout-discovers-new-spyware-goontact-used-by-sextortionists-for-blackmail
Lookout
New Spyware Used by Sextortionists | iOS/Android Blackmail | Threat Intel
The Lookout Threat Intelligence team has discovered a new mobile app threat targeting iOS and Android users in Chinese speaking countries, Korea and Japan.
Exploiting new-era of Request forgery on mobile applications
http://dphoeniixx.com/2020/12/13-2/
http://dphoeniixx.com/2020/12/13-2/
Journalists Hacked with Suspected NSO Group iMessage ‘Zero-Click’ Exploit
https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/
https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/
The Citizen Lab
The Great iPwn
Government operatives used NSO Group’s Pegasus spyware to hack 36 personal phones belonging to journalists, producers, anchors, and executives at Al Jazeera. The journalists were hacked by four Pegasus operators, including one operator MONARCHY that we attribute…
Analysis of 13 popular secure messaging apps:
https://cybernews.com/security/research-nearly-all-of-your-messaging-apps-are-secure/
https://cybernews.com/security/research-nearly-all-of-your-messaging-apps-are-secure/
Cybernews
Research: nearly all of your messaging apps are secure
We tested the security of 13 popular and less-popular secure messaging apps and have good news: most provide default security out of the box.
Settting up iOS Debugging
https://understruction.com/setting-up-ios-debugging
https://understruction.com/setting-up-ios-debugging
Android Security
Supplementary material for Android Trainings:
1) Deep Dive Android
2) Xtreme Android Hacking
3) Android Pentesting
https://github.com/anantshri/Android_Security
Supplementary material for Android Trainings:
1) Deep Dive Android
2) Xtreme Android Hacking
3) Android Pentesting
https://github.com/anantshri/Android_Security
GitHub
GitHub - anantshri/Android_Security: This repository is a suplimentary material for Android Training's done by Anant Shrivastava…
This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017 - anantshri/Android_Security
Explanation of Samsung's Real-time Kernel Protection and reveal the vulnerability, the one-liner exploit
https://blog.longterm.io/samsung_rkp.html
https://blog.longterm.io/samsung_rkp.html
Pwn To Own LG phones
https://douevenknow.us/post/639414006930702336/tying-it-all-together-pwning-to-own-on-lg-phones
https://douevenknow.us/post/639414006930702336/tying-it-all-together-pwning-to-own-on-lg-phones
Tumblr
Tying It All Together - Pwning To Own on LG phones
Last year I detailed a secure EL3 vulnerability which affected (and still affects, for devices with discontinued updates) LG Android devices. However, this vulnerability alone isn't actually all that...
Comparing user data gathering of popular messaging apps (Signal won)
https://9to5mac.com/2021/01/04/app-privacy-labels-messaging-apps/
https://9to5mac.com/2021/01/04/app-privacy-labels-messaging-apps/
9to5Mac
App privacy labels show stark contrasts among messaging apps - 9to5Mac
Apple's new app privacy labels went live in the App Store last month, giving users the chance to see what data is collected by each ...
Which messenger is the most secure?
Analysis done by Threema.
https://threema.ch/en/messenger-comparison
Analysis done by Threema.
https://threema.ch/en/messenger-comparison
threema.ch
Comparison of Popular Messenger Services – Threema
Signal, Telegram, WhatsApp, or Threema: Learn how these messengers differ in terms of privacy, features, and security.