The Challenges of Fuzzing 5G Protocols (NGAP, GTPU, PFCP, & DIAMETER)
Network fuzzers used:
- Fuzzowski
- Frizzer
- AFLNet
https://research.nccgroup.com/2021/10/11/the-challenges-of-fuzzing-5g-protocols/
Network fuzzers used:
- Fuzzowski
- Frizzer
- AFLNet
https://research.nccgroup.com/2021/10/11/the-challenges-of-fuzzing-5g-protocols/
👍1🥰1
Android Exploits 101 workshop
Overview of the modern Android exploits with examples + goes over the common flows of Android exploits
[video] https://youtu.be/squuwVQiPgg
Overview of the modern Android exploits with examples + goes over the common flows of Android exploits
[video] https://youtu.be/squuwVQiPgg
YouTube
Android Exploits 101 Workshop
This workshop is an overview of the "shape" of modern Android exploits with examples. It goes over the common flows of Android exploits, using lots of recent examples. This is an introductory overview to 0-day exploits targeting Android. Slides: https://…
🥰1
Oversecured released an iOS app vulnerability scanner
iOS vulnerability list: https://oversecured.com/vulnerabilities#iOS
Vulnerable app: https://github.com/oversecured/ovia
Report: https://content.oversecured.com/oversecured_sample_report_ios.pdf
iOS vulnerability list: https://oversecured.com/vulnerabilities#iOS
Vulnerable app: https://github.com/oversecured/ovia
Report: https://content.oversecured.com/oversecured_sample_report_ios.pdf
Minecraft was the most commonly used game noscript for masking cyber threats on mobile platforms between July 1, 2020, and June 30, 2021.
Upwards of 44 thousand gamers were affected, with close to 303 thousand unique detections
https://atlasvpn.com/blog/minecraft-most-malware-infected-game-on-the-market-with-228k-users-affected
Upwards of 44 thousand gamers were affected, with close to 303 thousand unique detections
https://atlasvpn.com/blog/minecraft-most-malware-infected-game-on-the-market-with-228k-users-affected
NordVPN
Real news from the cybersecurity world
At NordVPN, we believe that everyone deserves privacy and security online. Read our NordVPN blog for all the latest cybersecurity news and tech insights.
reFlutter - Flutter apps traffic monitoring
Make app trust installed certificates by repacking it with reFlutter and use Burp Suite. No root, no VPN.
https://github.com/ptswarm/reFlutter
Make app trust installed certificates by repacking it with reFlutter and use Burp Suite. No root, no VPN.
https://github.com/ptswarm/reFlutter
GitHub
GitHub - ptswarm/reFlutter: Flutter Reverse Engineering Framework
Flutter Reverse Engineering Framework. Contribute to ptswarm/reFlutter development by creating an account on GitHub.
👍1
The ultimate guide to Android SSL pinning bypass
https://redhuntlabs.com/wp-content/uploads/2021/10/Ultimate-Guide-to-SSL-Pinning-Bypass-RedHunt-Labs-Attack-Surface-Management.pdf
https://redhuntlabs.com/wp-content/uploads/2021/10/Ultimate-Guide-to-SSL-Pinning-Bypass-RedHunt-Labs-Attack-Surface-Management.pdf
New York Times Journalist Ben Hubbard Hacked with iOS Pegasus after Reporting on Previous Hacking Attempts
https://citizenlab.ca/2021/10/breaking-news-new-york-times-journalist-ben-hubbard-pegasus/
https://citizenlab.ca/2021/10/breaking-news-new-york-times-journalist-ben-hubbard-pegasus/
The Citizen Lab
Breaking the News: New York Times Journalist Ben Hubbard Hacked with Pegasus after Reporting on Previous Hacking Attempts - The…
Our forensic analysis of two iPhones belonging to Hubbard found evidence of Pegasus infections in July 2020 and June 2021. Notably, these infections occurred after Hubbard reported in January 2020 that we found that he was targeted in 2018 by the Saudi Arabia…
Location Data Firm Got GPS Data From Apps Even When People Opted Out (Huq SDK)
https://www.vice.com/en/article/5dgmqz/huq-location-data-opt-out-no-consent
https://www.vice.com/en/article/5dgmqz/huq-location-data-opt-out-no-consent
Vice
Location Data Firm Got GPS Data From Apps Even When People Opted Out
The news around location data firm Huq shows that data companies may not even really know if they've received consent to harvest information from ordinary phones.
Android fraud campaign (UltimaSMS) with 151 apps reached 10.5 million installs was used to subscribe users to premium SMS subnoscription services without their knowledge. 80 of them were on Google Play Store.
https://blog.avast.com/premium-sms-scam-apps-on-play-store-avast
https://blog.avast.com/premium-sms-scam-apps-on-play-store-avast
Avast
UltimaSMS: A widespread premium SMS scam on the Google Play Store
An array of scam apps, including a fake photo editor, camera filter, and various games, have been promoted via Instagram and TikTok channels.
How to exploit a double free vulnerability in 2021. 'Use-After-Free for Dummies'
https://github.com/stong/how-to-exploit-a-double-free
https://github.com/stong/how-to-exploit-a-double-free
GitHub
GitHub - stong/how-to-exploit-a-double-free: How to exploit a double free vulnerability in 2021. Use After Free for Dummies
How to exploit a double free vulnerability in 2021. Use After Free for Dummies - stong/how-to-exploit-a-double-free
👍1
Use-After-Free in Voice Control: CVE-2021-30902 Write-up
https://blog.zecops.com/research/use-after-free-in-voice-control-cve-2021-30902/
https://blog.zecops.com/research/use-after-free-in-voice-control-cve-2021-30902/
Jamf
Jamf Threat Labs | Blog
Android spyware apps target Israel in three-year-long campaign (APT-C-23)
https://www.bleepingcomputer.com/news/security/android-spyware-apps-target-israel-in-three-year-long-campaign/
https://www.bleepingcomputer.com/news/security/android-spyware-apps-target-israel-in-three-year-long-campaign/
BleepingComputer
Android spyware apps target Israel in three-year-long campaign
A set of seemingly innocuous Android apps have been infecting Israeli users with spyware since 2018, and the campaign continues to this day.
👍1
iPhone Apps Can Tell Many Things About You Through the Accelerometer
https://www.mysk.blog/2021/10/24/accelerometer-ios/
https://www.mysk.blog/2021/10/24/accelerometer-ios/
Mysk Blog – In-Depth Cybersecurity & Mobile App Privacy Research
iPhone Apps Can Tell Many Things About You Through the Accelerometer
Nearly every modern smartphone is equipped with an accelerometer, which, as the name implies, is a sensor that measures acceleration. It's most commonly used for detecting the device's orientation. It also has many other uses, whether as a game controller…
Android AbstractEmu Malware: Rooting Malware Makes a Comeback
https://blog.lookout.com/lookout-discovers-global-rooting-malware-campaign
https://blog.lookout.com/lookout-discovers-global-rooting-malware-campaign
Lookout
Rooting Malware Makes Comeback: Lookout Discovers Global Campaign | Threat Intel
Security researchers at Lookout have identified a new rooting malware distributed on Google Play, the Amazon Appstore and the Samsung Galaxy Store.
Android security checklist: WebView
https://blog.oversecured.com/Android-security-checklist-webview/
https://blog.oversecured.com/Android-security-checklist-webview/
News, Techniques & Guides
Android security checklist: WebView
WebView is a web browser that can be built into an app, and represents the most widely used component of the Android ecosystem; it is also subject to the largest number of potential errors.
Android WebViews use and abuse
https://docs.google.com/presentation/d/18xhCZ4fnC2UC4FZ7w_zEIKfiejckn86JU1RqGxvEhTM/mobilepresent?slide=id.g1006589e594_0_3
https://docs.google.com/presentation/d/18xhCZ4fnC2UC4FZ7w_zEIKfiejckn86JU1RqGxvEhTM/mobilepresent?slide=id.g1006589e594_0_3
Google Docs
AS - WebViews
APPLICATION SECURITY (Threats and Malpractices) Speaker: Dimitrios Valsamaras | @Ch0pin https://www.linkedin.com/in/valsamaras/
Mobile malware activity - Threat Intelligence Report 2021 by Nokia
https://onestore.nokia.com/asset/210870
https://onestore.nokia.com/asset/210870
OneStore
Nokia: Threat Intelligence Report 2021
This report provides a view of malware activity in mobile and fixed networks around
the world. The data has been aggregated from service provider net
the world. The data has been aggregated from service provider net
Sophos threat report (Flubot, fake iPhone finance apps, Joker)
https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2022-threat-report.pdf
https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2022-threat-report.pdf
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices
https://cseweb.ucsd.edu//~nibhaska/papers/sp22_paper.pdf
https://cseweb.ucsd.edu//~nibhaska/papers/sp22_paper.pdf
Targeted SMiShing Attacks on Indian Banking Users
https://labs.k7computing.com/index.php/targeted-smishing-attacks-on-indian-banking-users/
https://labs.k7computing.com/index.php/targeted-smishing-attacks-on-indian-banking-users/
K7 Labs
Targeted SMiShing Attacks on Indian Banking Users
Threat actors are constantly using new tricks and tactics to collect various confidential credentials from users’ mobile devices via phishing […]