Bug found in Android Telegram: Messages that should be auto-deleted from participants in private and private group chats were only 'deleted' visually [in the messaging window], but in reality, picture messages remained on the device in the cache (CVE-2021-41861) https://arstechnica.com/information-technology/2021/10/researcher-refuses-telegrams-bounty-award-discloses-auto-delete-bug/
Ars Technica
Researcher refuses Telegram’s bounty award, discloses auto-delete bug
Telegram took months to fix “self-destruct” message bug. Then requested silence.
Waydro - Android on Linux (boot a full Android system on a regular GNU/Linux system like Ubuntu)
https://waydro.id/
https://waydro.id/
Are iPhones Really Better for Privacy? Comparative Study of iOS and Android Apps
https://arxiv.org/abs/2109.13722
https://arxiv.org/abs/2109.13722
Togo: Prominent activist targeted with Indian-made Android spyware linked to Donot Team hacker group (APT-C-35)
Article: https://www.amnesty.org/en/latest/news/2021/10/togo-activist-targeted-with-spyware-by-notorious-hacker-group/
Full report: https://www.amnesty.org/en/documents/afr57/4756/2021/en/
Article: https://www.amnesty.org/en/latest/news/2021/10/togo-activist-targeted-with-spyware-by-notorious-hacker-group/
Full report: https://www.amnesty.org/en/documents/afr57/4756/2021/en/
Amnesty International
Togo: Prominent activist targeted with Indian-made spyware linked to notorious hacker group
New research reveals activists in Togo risk being targeted by shadowy cyber-mercenaries who use covert digital attacks to steal victims’ private information
PoC for today's patched iPhone 0-day vulnerability in IOMobileFrameBuffer/AppleCLCD that has been exploited in the wild (CVE-2021-30883)
https://saaramar.github.io/IOMFB_integer_overflow_poc/
https://saaramar.github.io/IOMFB_integer_overflow_poc/
Malicious apps found on Google Play Store could steal Facebook credentials by injecting JavaScript in WebView while facebook[.]com has been displayed
https://www.bleepingcomputer.com/news/security/photo-editor-android-app-still-sitting-on-google-play-store-is-malware/
https://www.bleepingcomputer.com/news/security/photo-editor-android-app-still-sitting-on-google-play-store-is-malware/
BleepingComputer
Photo editor Android app STILL sitting on Google Play store is malware
An Android app sitting on the Google Play store touts itself to be a photo editor app. But, it contains code that steals the user's Facebook credentials to potentially run ad campaigns on the user's behalf, with their payment information. The app has scored…
Demonstration how Android malware steals recovery phrase from Trust Crypto Wallet without user interaction and restricts access to victims smartphone
https://youtu.be/cI9GbhspMYY
https://youtu.be/cI9GbhspMYY
YouTube
How Android malware steals recovery phrase from Trust Wallet without user interaction
Android malware automatically steals recovery phrase from Trust Crypto Wallet and restricts access to victims smartphone by blocking all the actions such as removing it and protecting its cryptocurrency fonds.
This malware can steal recover phrase only from…
This malware can steal recover phrase only from…
CVE-2021-30858: Use-after-free in WebKit affecting pre-Safari 14.1.2, pre-iOS 14.8
https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2021/CVE-2021-30858.html
https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2021/CVE-2021-30858.html
A threat analysis of sideloading by Apple
There are 31 pages explaining why Apple will not allow sideloading apps on iOS
https://www.apple.com/privacy/docs/Building_a_Trusted_Ecosystem_for_Millions_of_Apps_A_Threat_Analysis_of_Sideloading.pdf
There are 31 pages explaining why Apple will not allow sideloading apps on iOS
https://www.apple.com/privacy/docs/Building_a_Trusted_Ecosystem_for_Millions_of_Apps_A_Threat_Analysis_of_Sideloading.pdf
Malware bypassing OTP-based authentication to target Indian Banking customers
https://blog.cyble.com/2021/10/13/malware-bypassing-otp-based-authentication-to-target-indian-banking-customers/
https://blog.cyble.com/2021/10/13/malware-bypassing-otp-based-authentication-to-target-indian-banking-customers/
Cyble
Cyble - Malware Bypassing OTP-based Authentication To Target Indian Banking Customers
A phishing campaign has been targeting the customers of an Indian bank using a Stealer app.
CryptoRomance fake iOS cryptocurrency apps hit US, European victims for at least $1.4 million
https://news.sophos.com/en-us/2021/10/13/cryptorom-fake-ios-cryptocurrency-apps/
https://news.sophos.com/en-us/2021/10/13/cryptorom-fake-ios-cryptocurrency-apps/
Sophos News
CryptoRom fake iOS cryptocurrency apps hit US, European victims for at least $1.4 million
Scammers combine romantic lures with crypto scams, abusing Apple’s ad-hoc app distribution to steal millions from people around the world.
Google's Threat Analysis Group (TAG) found an attempt to upload Android spyware to Google Play Store disguised as a VPN app. It was part of APT35 group.
https://blog.google/threat-analysis-group/countering-threats-iran/
https://blog.google/threat-analysis-group/countering-threats-iran/
Google
Countering threats from Iran
Google’s Threat Analysis Group tracks actors involved in disinformation campaigns, government backed hacking, and financially motivated abuse. We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed…
The Challenges of Fuzzing 5G Protocols (NGAP, GTPU, PFCP, & DIAMETER)
Network fuzzers used:
- Fuzzowski
- Frizzer
- AFLNet
https://research.nccgroup.com/2021/10/11/the-challenges-of-fuzzing-5g-protocols/
Network fuzzers used:
- Fuzzowski
- Frizzer
- AFLNet
https://research.nccgroup.com/2021/10/11/the-challenges-of-fuzzing-5g-protocols/
👍1🥰1
Android Exploits 101 workshop
Overview of the modern Android exploits with examples + goes over the common flows of Android exploits
[video] https://youtu.be/squuwVQiPgg
Overview of the modern Android exploits with examples + goes over the common flows of Android exploits
[video] https://youtu.be/squuwVQiPgg
YouTube
Android Exploits 101 Workshop
This workshop is an overview of the "shape" of modern Android exploits with examples. It goes over the common flows of Android exploits, using lots of recent examples. This is an introductory overview to 0-day exploits targeting Android. Slides: https://…
🥰1
Oversecured released an iOS app vulnerability scanner
iOS vulnerability list: https://oversecured.com/vulnerabilities#iOS
Vulnerable app: https://github.com/oversecured/ovia
Report: https://content.oversecured.com/oversecured_sample_report_ios.pdf
iOS vulnerability list: https://oversecured.com/vulnerabilities#iOS
Vulnerable app: https://github.com/oversecured/ovia
Report: https://content.oversecured.com/oversecured_sample_report_ios.pdf
Minecraft was the most commonly used game noscript for masking cyber threats on mobile platforms between July 1, 2020, and June 30, 2021.
Upwards of 44 thousand gamers were affected, with close to 303 thousand unique detections
https://atlasvpn.com/blog/minecraft-most-malware-infected-game-on-the-market-with-228k-users-affected
Upwards of 44 thousand gamers were affected, with close to 303 thousand unique detections
https://atlasvpn.com/blog/minecraft-most-malware-infected-game-on-the-market-with-228k-users-affected
NordVPN
Real news from the cybersecurity world
At NordVPN, we believe that everyone deserves privacy and security online. Read our NordVPN blog for all the latest cybersecurity news and tech insights.
reFlutter - Flutter apps traffic monitoring
Make app trust installed certificates by repacking it with reFlutter and use Burp Suite. No root, no VPN.
https://github.com/ptswarm/reFlutter
Make app trust installed certificates by repacking it with reFlutter and use Burp Suite. No root, no VPN.
https://github.com/ptswarm/reFlutter
GitHub
GitHub - ptswarm/reFlutter: Flutter Reverse Engineering Framework
Flutter Reverse Engineering Framework. Contribute to ptswarm/reFlutter development by creating an account on GitHub.
👍1
The ultimate guide to Android SSL pinning bypass
https://redhuntlabs.com/wp-content/uploads/2021/10/Ultimate-Guide-to-SSL-Pinning-Bypass-RedHunt-Labs-Attack-Surface-Management.pdf
https://redhuntlabs.com/wp-content/uploads/2021/10/Ultimate-Guide-to-SSL-Pinning-Bypass-RedHunt-Labs-Attack-Surface-Management.pdf
New York Times Journalist Ben Hubbard Hacked with iOS Pegasus after Reporting on Previous Hacking Attempts
https://citizenlab.ca/2021/10/breaking-news-new-york-times-journalist-ben-hubbard-pegasus/
https://citizenlab.ca/2021/10/breaking-news-new-york-times-journalist-ben-hubbard-pegasus/
The Citizen Lab
Breaking the News: New York Times Journalist Ben Hubbard Hacked with Pegasus after Reporting on Previous Hacking Attempts - The…
Our forensic analysis of two iPhones belonging to Hubbard found evidence of Pegasus infections in July 2020 and June 2021. Notably, these infections occurred after Hubbard reported in January 2020 that we found that he was targeted in 2018 by the Saudi Arabia…
Location Data Firm Got GPS Data From Apps Even When People Opted Out (Huq SDK)
https://www.vice.com/en/article/5dgmqz/huq-location-data-opt-out-no-consent
https://www.vice.com/en/article/5dgmqz/huq-location-data-opt-out-no-consent
Vice
Location Data Firm Got GPS Data From Apps Even When People Opted Out
The news around location data firm Huq shows that data companies may not even really know if they've received consent to harvest information from ordinary phones.