Android fraud campaign (UltimaSMS) with 151 apps reached 10.5 million installs was used to subscribe users to premium SMS subnoscription services without their knowledge. 80 of them were on Google Play Store.
https://blog.avast.com/premium-sms-scam-apps-on-play-store-avast
https://blog.avast.com/premium-sms-scam-apps-on-play-store-avast
Avast
UltimaSMS: A widespread premium SMS scam on the Google Play Store
An array of scam apps, including a fake photo editor, camera filter, and various games, have been promoted via Instagram and TikTok channels.
How to exploit a double free vulnerability in 2021. 'Use-After-Free for Dummies'
https://github.com/stong/how-to-exploit-a-double-free
https://github.com/stong/how-to-exploit-a-double-free
GitHub
GitHub - stong/how-to-exploit-a-double-free: How to exploit a double free vulnerability in 2021. Use After Free for Dummies
How to exploit a double free vulnerability in 2021. Use After Free for Dummies - stong/how-to-exploit-a-double-free
👍1
Use-After-Free in Voice Control: CVE-2021-30902 Write-up
https://blog.zecops.com/research/use-after-free-in-voice-control-cve-2021-30902/
https://blog.zecops.com/research/use-after-free-in-voice-control-cve-2021-30902/
Jamf
Jamf Threat Labs | Blog
Android spyware apps target Israel in three-year-long campaign (APT-C-23)
https://www.bleepingcomputer.com/news/security/android-spyware-apps-target-israel-in-three-year-long-campaign/
https://www.bleepingcomputer.com/news/security/android-spyware-apps-target-israel-in-three-year-long-campaign/
BleepingComputer
Android spyware apps target Israel in three-year-long campaign
A set of seemingly innocuous Android apps have been infecting Israeli users with spyware since 2018, and the campaign continues to this day.
👍1
iPhone Apps Can Tell Many Things About You Through the Accelerometer
https://www.mysk.blog/2021/10/24/accelerometer-ios/
https://www.mysk.blog/2021/10/24/accelerometer-ios/
Mysk Blog – In-Depth Cybersecurity & Mobile App Privacy Research
iPhone Apps Can Tell Many Things About You Through the Accelerometer
Nearly every modern smartphone is equipped with an accelerometer, which, as the name implies, is a sensor that measures acceleration. It's most commonly used for detecting the device's orientation. It also has many other uses, whether as a game controller…
Android AbstractEmu Malware: Rooting Malware Makes a Comeback
https://blog.lookout.com/lookout-discovers-global-rooting-malware-campaign
https://blog.lookout.com/lookout-discovers-global-rooting-malware-campaign
Lookout
Rooting Malware Makes Comeback: Lookout Discovers Global Campaign | Threat Intel
Security researchers at Lookout have identified a new rooting malware distributed on Google Play, the Amazon Appstore and the Samsung Galaxy Store.
Android security checklist: WebView
https://blog.oversecured.com/Android-security-checklist-webview/
https://blog.oversecured.com/Android-security-checklist-webview/
News, Techniques & Guides
Android security checklist: WebView
WebView is a web browser that can be built into an app, and represents the most widely used component of the Android ecosystem; it is also subject to the largest number of potential errors.
Android WebViews use and abuse
https://docs.google.com/presentation/d/18xhCZ4fnC2UC4FZ7w_zEIKfiejckn86JU1RqGxvEhTM/mobilepresent?slide=id.g1006589e594_0_3
https://docs.google.com/presentation/d/18xhCZ4fnC2UC4FZ7w_zEIKfiejckn86JU1RqGxvEhTM/mobilepresent?slide=id.g1006589e594_0_3
Google Docs
AS - WebViews
APPLICATION SECURITY (Threats and Malpractices) Speaker: Dimitrios Valsamaras | @Ch0pin https://www.linkedin.com/in/valsamaras/
Mobile malware activity - Threat Intelligence Report 2021 by Nokia
https://onestore.nokia.com/asset/210870
https://onestore.nokia.com/asset/210870
OneStore
Nokia: Threat Intelligence Report 2021
This report provides a view of malware activity in mobile and fixed networks around
the world. The data has been aggregated from service provider net
the world. The data has been aggregated from service provider net
Sophos threat report (Flubot, fake iPhone finance apps, Joker)
https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2022-threat-report.pdf
https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2022-threat-report.pdf
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices
https://cseweb.ucsd.edu//~nibhaska/papers/sp22_paper.pdf
https://cseweb.ucsd.edu//~nibhaska/papers/sp22_paper.pdf
Targeted SMiShing Attacks on Indian Banking Users
https://labs.k7computing.com/index.php/targeted-smishing-attacks-on-indian-banking-users/
https://labs.k7computing.com/index.php/targeted-smishing-attacks-on-indian-banking-users/
K7 Labs
Targeted SMiShing Attacks on Indian Banking Users
Threat actors are constantly using new tricks and tactics to collect various confidential credentials from users’ mobile devices via phishing […]
PhoneSpy: The App-Based Cyberattack Snooping South Korean Citizens
https://blog.zimperium.com/phonespy-the-app-based-cyberattack-snooping-south-korean-citizens/
https://blog.zimperium.com/phonespy-the-app-based-cyberattack-snooping-south-korean-citizens/
Zimperium
PhoneSpy: The App-Based Cyberattack Snooping South Korean Citizens - Zimperium
true
BrakTooth Proof of Concept Tool Demonstrates Bluetooth Vulnerabilities
BrakTooth—originally disclosed in August 2021—is a family of security vulnerabilities in commercial Bluetooth stacks. An attacker could exploit BrakTooth vulnerabilities to cause a range of effects from denial-of-service to arbitrary code execution.
https://github.com/Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks
BrakTooth—originally disclosed in August 2021—is a family of security vulnerabilities in commercial Bluetooth stacks. An attacker could exploit BrakTooth vulnerabilities to cause a range of effects from denial-of-service to arbitrary code execution.
https://github.com/Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks
GitHub
GitHub - Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks: A Series of Baseband & LMP Exploits against Bluetooth Classic…
A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers - Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks
The Art of Exploiting UAF by Ret2bpf in Android Kernel [slides][whitepaper]
https://www.blackhat.com/eu-21/briefings/schedule/#the-art-of-exploiting-uaf-by-retbpf-in-android-kernel-24544
https://www.blackhat.com/eu-21/briefings/schedule/#the-art-of-exploiting-uaf-by-retbpf-in-android-kernel-24544
Blackhat
Black Hat Europe 2021
Re-route Your Intent for Privilege Escalation: A Universal Way to Exploit Android PendingIntents in High-profile and System Apps [slides]
https://www.blackhat.com/eu-21/briefings/schedule/index.html#re-route-your-intent-for-privilege-escalation-a-universal-way-to-exploit-android-pendingintents-in-high-profile-and-system-apps-24340
https://www.blackhat.com/eu-21/briefings/schedule/index.html#re-route-your-intent-for-privilege-escalation-a-universal-way-to-exploit-android-pendingintents-in-high-profile-and-system-apps-24340
Blackhat
Black Hat Europe 2021
A Deep Dive into Privacy Dashboard of Top Android Vendors [slides]
https://www.blackhat.com/eu-21/briefings/schedule/index.html#a-deep-dive-into-privacy-dashboard-of-top-android-vendors-24791
https://www.blackhat.com/eu-21/briefings/schedule/index.html#a-deep-dive-into-privacy-dashboard-of-top-android-vendors-24791
Blackhat
Black Hat Europe 2021
SharkBot: a new generation of Android Trojans is targeting banks in Europe
https://www.cleafy.com/cleafy-labs/sharkbot-a-new-generation-of-android-trojan-is-targeting-banks-in-europe
https://www.cleafy.com/cleafy-labs/sharkbot-a-new-generation-of-android-trojan-is-targeting-banks-in-europe
Cleafy
SharkBot: a new generation of Android Trojans is targeting banks in Europe | Cleafy Labs
SharkBot: a new generation of Android Trojans is targeting European banks. It has been discovered by the threat intelligence team of Cleafy: here's the technical analysis.
👍1
Mobile malware mimicking framework #blackhat
https://maxkersten.nl/wp-content/uploads/2021/11/BHEU21_m3.pdf
https://maxkersten.nl/wp-content/uploads/2021/11/BHEU21_m3.pdf
Armv8 / AArch64 Assembly Cheatsheet
https://azeria.gumroad.com/l/aarch64-cheatsheet
https://azeria.gumroad.com/l/aarch64-cheatsheet
Gumroad
Armv8-A AArch64 Cheatsheet 2021
Brand-new Armv8-A AArch64 Assembly Cheatsheet! Resolution for 2880 x 1800 screens (MacBook) at 150 PPI (6000 x 3750).Free download (you can set price to $0, then download) since it's the first vers...