Going Rogue - a Mastermind behind Android Malware Returns with a New RAT
https://research.checkpoint.com/2021/going-rogue-a-mastermind-behind-android-malware-returns-with-a-new-rat/
https://research.checkpoint.com/2021/going-rogue-a-mastermind-behind-android-malware-returns-with-a-new-rat/
Check Point Research
Going Rogue- a Mastermind behind Android Malware Returns with a New RAT - Check Point Research
Research by: Aviran Hazum, Alex Shamshur, Raman Ladutska, Ohad Mana, Israel Wernik Introduction Now more than ever, we rely on our smartphones to keep in touch with our work, our families and the world around us. There are over 3.5 billion smartphone users…
Detail analysis of Android vulnerabilities being exploited in the wild found by Project Zero
Android Exploits ITW: https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html
Android Post-Exploitation https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html
Android Exploits ITW: https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html
Android Post-Exploitation https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html
Blogspot
In-the-Wild Series: Android Exploits
This is part 4 of a 6-part series detailing a set of vulnerabilities found by Project Zero being exploited in the wild. To read the other pa...
👍1
xnuspy - iOS kernel function hooking framework for checkra1n'able devices
https://github.com/jsherman212/xnuspy
https://github.com/jsherman212/xnuspy
GitHub
GitHub - jsherman212/xnuspy: an iOS kernel function hooking framework for checkra1n'able devices
an iOS kernel function hooking framework for checkra1n'able devices - jsherman212/xnuspy
How to use Ghidra to Reverse Engineer Mobile Application
https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa
https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa
Medium
How to use Ghidra to Reverse Engineer Mobile Application
Unveil the
Adware found on Google Play store
https://www.whiteops.com/blog/imitation-is-the-sincerest-form-of-fraudery?s=03
https://www.whiteops.com/blog/imitation-is-the-sincerest-form-of-fraudery?s=03
HUMAN
Imitation is the sincerest form of fraudery
The White Ops Satori Threat Intelligence and Research Team uncovered more than 140 fraudulent apps with more than ten million downloads among them.
Reverse Engineering Android React Native application
https://secureitmania.medium.com/lets-know-how-i-have-explored-the-buried-secrets-in-react-native-application-6236728198f7
https://secureitmania.medium.com/lets-know-how-i-have-explored-the-buried-secrets-in-react-native-application-6236728198f7
Medium
Let’s know How I have explored the buried secrets in React Native application
A new era in Android Reverse Engineering part-1
Vulnerability in Shazam application allowed an attacker to steal location of a user by clicking a link
https://www.ash-king.co.uk/blog/Shazlocate-abusing-CVE-2019-8791-CVE-2019-8792
https://www.ash-king.co.uk/blog/Shazlocate-abusing-CVE-2019-8791-CVE-2019-8792
www.ash-king.co.uk
ShazLocate!
Abusing CVE-2019-8791 & CVE-2019-8792
Abusing CVE-2019-8791 & CVE-2019-8792
Stealing location data with a single click via Shazam
How to gain access to arbitrary Content Providers
https://blog.oversecured.com/Gaining-access-to-arbitrary-Content-Providers/
https://blog.oversecured.com/Gaining-access-to-arbitrary-Content-Providers/
News, Techniques & Guides
Gaining access to arbitrary* Content Providers
The vulnerability we shall be looking at is very common, but remains little known. We want to shed some light on it today, so as to help app developers avoid it when they write their apps and security researchers find it in other people's apps and warn the…
A Special Attack Surface of the Android System (1): Evil Dialog Box
https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1351377961017942016
https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1351377961017942016
Blowing the Cover of Android Binary Fuzzing
https://speakerdeck.com/flankerhqd/blowing-the-cover-of-android-binary-fuzzing
https://speakerdeck.com/flankerhqd/blowing-the-cover-of-android-binary-fuzzing
MobileAudit - performs security testing and malware analysis for Android APKs
https://github.com/mpast/mobileAudit
https://github.com/mpast/mobileAudit
GitHub
GitHub - mpast/mobileAudit: Django application that performs SAST and Malware Analysis for Android APKs
Django application that performs SAST and Malware Analysis for Android APKs - mpast/mobileAudit
Analysis of Android Worm that spreads via WhatsApp messages as Huawei Mobile app
https://youtu.be/XXi29noe2NE
https://youtu.be/XXi29noe2NE
Different Android security lock states and their trade-offs
https://www.mayrhofer.eu.org/post/android-tradeoffs-2-lockstates/
https://www.mayrhofer.eu.org/post/android-tradeoffs-2-lockstates/
René Mayrhofer
Android security trade-offs 2: Lock states | René Mayrhofer
Android has different types of lock states. This post summarizes what they are, what their purpose is, and how the interact.
Update your iOS!
iOS 0days chain /RCE+LPE/ is being exploited ITW. The fix is available.
https://support.apple.com/en-us/HT212146
iOS 0days chain /RCE+LPE/ is being exploited ITW. The fix is available.
https://support.apple.com/en-us/HT212146
Apple Support
About the security content of iOS 14.4 and iPadOS 14.4
This document describes the security content of iOS 14.4 and iPadOS 14.4.
Apparently new Android banking Trojan called "Oscorp" spreads in Italy
http://translate.google.com/translate?hl=en&sl=auto&tl=en&u=https%3A%2F%2Fcert-agid.gov.it%2Fnews%2Foscorp-il-solito-malware-per-android%2F
http://translate.google.com/translate?hl=en&sl=auto&tl=en&u=https%3A%2F%2Fcert-agid.gov.it%2Fnews%2Foscorp-il-solito-malware-per-android%2F
Demo of technique used by Android malware that prevents victim to uninstall it from device (how to fix it)
https://youtu.be/YvfiKPpMoaU
https://youtu.be/YvfiKPpMoaU
Useful insight on Android's Special App Accesses, since they are treated and mitigated differently as regular app permissions
https://medium.com/mitre-attack/mobile-attack-mitigating-android-abuse-50516fb7de85
https://medium.com/mitre-attack/mobile-attack-mitigating-android-abuse-50516fb7de85
Medium
Mitigating Abuse of Android Application Permissions and Special App Accesses
Part 1 of a series on ATT&CK® for Mobile (Android and iOS) devices
Security Fixes and Rewards for Chrome for Android
https://chromereleases.googleblog.com/2020/10/chrome-for-android-update_31.html
https://chromereleases.googleblog.com/2020/10/chrome-for-android-update_31.html
Chrome Releases
Chrome for Android Update
Hi, everyone! We've just released Chrome 86 (86.0.4240.99) for Android: it'll become available on Google Play over the next few weeks. Thi...
👍2
Investigation Xoth: Smartphone location tracking
https://www.expressvpn.com/digital-security-lab/investigation-xoth
https://www.expressvpn.com/digital-security-lab/investigation-xoth
ExpressVPN
ExpressVPN’s Research on Smartphone Location Tracking | ExpressVPN
Investigation Xoth is the ExpressVPN Digital Security Lab’s research into smartphone location tracking. Read about its findings here.
Reverse Engineering iMessage: Leveraging the Hardware to Protect the Software
https://www.nowsecure.com/blog/2021/01/27/reverse-engineering-imessage-leveraging-the-hardware-to-protect-the-software/
https://www.nowsecure.com/blog/2021/01/27/reverse-engineering-imessage-leveraging-the-hardware-to-protect-the-software/
Nowsecure
Reverse Engineering iMessage to Help Improve Security | NowSecure
Our researcher reverse engineered Apple iMessage to explore extending it the secure messaging app to other systems. See how he fared.
Forwarded from The Bug Bounty Hunter
Android Penetration Testing: Frida https://www.hackingarticles.in/android-penetration-testing-frida/
Hacking Articles
Android Penetration Testing: Frida
Learn how to use Frida for Android penetration testing, including hooking, injecting, and analyzing Android apps for security vulnerabilities.
❤1