Android Security & Malware – Telegram
Android Security & Malware
43.3K subscribers
127 photos
19 videos
7 files
2.69K links
Mobile cybersecurity channel
Links: https://linktr.ee/mobilehacker
Contact: mobilehackerofficial@gmail.com
Download Telegram
Detail analysis of a high quality bug in the JavaScript engine capable of bypassing all current iOS mitigations!
[PDF presentation] https://objectivebythesea.com/v2/talks/OBTS_v2_Todesco.pdf
Unofficial Telegram App Secretly Loads Infinite Malicious Sites

MobonoGram 2019 app was downloaded more than 100,000 times and performed adfraud clicks.
https://www.symantec.com/blogs/threat-intelligence/unofficial-telegram-app-malicious-sites
Hacking into Tinder’s Premium Model

Vulnerability in Tinder API allows user to see photo of person that already liked you without premium model.
Tinder responded: We are aware and we choose to not take any action.
https://medium.com/@sansyrox/hacking-tinders-premium-model-43f9f699d44
Exploiting SSL Vulnerabilities in Mobile Apps

How an attacker can exploit a vulnerable app’s broken SSL implementation and intercept cleartext HTTPS traffic – without the victim having installed any CA Certificates or accepting any additional untrusted certificates.
https://www.allysonomalley.com/2019/07/15/exploiting-ssl-vulnerabilities-in-mobile-apps/
Kali NetHunter App Store 

The New Android Store Dedicated to Free Security Apps based on F-Droid
https://www.offensive-security.com/kali-nethunter/kali-nethunter-app-store/
Google Banned Major Chinese App Developer CooTek From The Play Store And Its Ad Platforms

CooTek, based in Shanghai, had hundreds of Android apps in the Play store. More than 60 of its apps have been removed from the Play store, and CooTek is now completely banned from Google’s lucrative ad platforms.
CooTek is the second major Chinese app developer to receive a ban by Google this year.
https://www.buzzfeednews.com/article/craigsilverman/google-banned-cootek-adware
Android Malware Analysis : Dissecting Hydra Dropper

Includes GDB debugging of its native library
https://pentest.blog/android-malware-analysis-dissecting-hydra-dropper/