Android & iOS mobile security cheatsheets
https://github.com/justmobilesec/Android-iOS-Cheat-Sheet/
https://github.com/justmobilesec/Android-iOS-Cheat-Sheet/
👍18🔥5👏2❤1
TicWatch Pro: Returning to Factory Firmware
If you messed up while rooting and installing NetHunter, you can always go back to stock ROM
https://www.mobile-hacker.com/2024/07/16/ticwatch-pro-returning-to-factory-firmware/
If you messed up while rooting and installing NetHunter, you can always go back to stock ROM
https://www.mobile-hacker.com/2024/07/16/ticwatch-pro-returning-to-factory-firmware/
Mobile Hacker
TicWatch Pro: Returning to Factory Firmware
In previous blog I guide you how to root TicWatch Pro and install Kali NetHunter. In this tutorial, I will lead you how to start clean by flashing default stock system ROM (factory firmware) on your TicWatch Pro smartwatches. Why? In case you end up in any…
👍11
Jailbreaking Rabbit R1 running RabbitOS
https://www.da.vidbuchanan.co.uk/blog/r1-jailbreak.html
https://www.da.vidbuchanan.co.uk/blog/r1-jailbreak.html
👍6
Install NetHunter on TicWatch Pro after flashing factory firmware + troubleshooting
https://www.mobile-hacker.com/2024/07/17/install-nethunter-on-ticwatch-pro-after-flashing-factory-firmware/
https://www.mobile-hacker.com/2024/07/17/install-nethunter-on-ticwatch-pro-after-flashing-factory-firmware/
Mobile Hacker
Install NetHunter on TicWatch Pro after flashing factory firmware
You tried to flash custom ROM, root it or install Kali NetHunter on your TicWatch Pro (catfish) but something went wrong? Your smartwatches end-up in bootloop, always boots into recovery, from installation logs you were informed there is not enough free space…
👍14
APKscan: Scan for secrets, endpoints, API keys, tokens, credentials in Android apps
https://github.com/LucasFaudman/apkscan
https://github.com/LucasFaudman/apkscan
GitHub
GitHub - LucasFaudman/apkscan: Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android…
Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class, .smali, .zip, .aar, .arsc, .aab, .jadx.kts). - LucasFaudma...
❤21🔥8👍4👏3
Use TicWatch Pro as a Keystroke Injector
https://www.mobile-hacker.com/2024/07/18/ticwatch-pro-as-a-keystroke-injector/
https://www.mobile-hacker.com/2024/07/18/ticwatch-pro-as-a-keystroke-injector/
Mobile Hacker
TicWatch Pro as a Keystroke Injector
If you successfully installed NetHunter as described in previous blogs, we can start use its tools. In this blog, I will focus on Duck Hunter provided by NetHunter. Using DuckHunter allows our TicWatch Pro smartwatches to behave as Rubber Ducky, also known…
👍11
Cellebrite leaked documents display which Android and iOS versions it is capable to unlock and access data from
https://www.404media.co/leaked-docs-show-what-phones-cellebrite-can-and-cant-unlock/
https://www.404media.co/leaked-docs-show-what-phones-cellebrite-can-and-cant-unlock/
❤22👍4
Konfety Spreads ‘Evil Twin’ Android Apps for Multiple Fraud Schemes
https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-konfety-spreads-evil-twin-apps-for-multiple-fraud-schemes
https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-konfety-spreads-evil-twin-apps-for-multiple-fraud-schemes
HUMAN Security
Satori Threat Intelligence Alert: Konfety Spreads ‘Evil Twin’ Apps for Multiple Fraud Schemes - HUMAN Security
Uncover the intricate web of the Konfety ad fraud operation spreading through 'evil twin' apps, exposing malicious tactics and deceptive practices in the mobile advertising realm.
👍8
Beware of BadPack: One Weird Trick Being Used Against Android Devices
https://unit42.paloaltonetworks.com/apk-badpack-malware-tampered-headers/
https://unit42.paloaltonetworks.com/apk-badpack-malware-tampered-headers/
Unit 42
Beware of BadPack: One Weird Trick Being Used Against Android Devices
Our data shows a pattern of APK malware bundled as BadPack files. We discuss how this technique is used to garble malicious Android files, creating challenges for analysts.
👌12👍5❤4
Exploiting the EvilVideo vulnerability on Telegram
Discovered a 0-day Telegram for Android exploit that allows sending malicious apps disguised as videos
https://www.welivesecurity.com/en/eset-research/cursed-tapes-exploiting-evilvideo-vulnerability-telegram-android/
Discovered a 0-day Telegram for Android exploit that allows sending malicious apps disguised as videos
https://www.welivesecurity.com/en/eset-research/cursed-tapes-exploiting-evilvideo-vulnerability-telegram-android/
Welivesecurity
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos.
👍11🔥4❤1👎1👏1
Hacking a 2014 tablet... in 2024!
https://blog.r0rt1z2.com/hacking-a-2014-tablet-in-2024.html
https://blog.r0rt1z2.com/hacking-a-2014-tablet-in-2024.html
❤12🔥4🥰3
Part 1: Injecting and Exploiting Synthetic Remote Vulnerabilities to explore Signal-iOS and WebRTC
https://margin.re/2024/07/you-cant-spell-webrtc-without-rce-part-1/
https://margin.re/2024/07/you-cant-spell-webrtc-without-rce-part-1/
Margin Research
You Can't Spell WebRTC without RCE - Part 1
Injecting and Exploiting Synthetic Remote Vulnerabilities to explore Signal-iOS and WebRTC
It’s another average Friday morning and my iPhone shows 705 unread Signal messages. Signal has not completely supplanted my use of iMessage, but it does dominate communications…
It’s another average Friday morning and my iPhone shows 705 unread Signal messages. Signal has not completely supplanted my use of iMessage, but it does dominate communications…
🔥17🥰1
WhatsApp trick: Android malware can impersonate PDF file
https://www.mobile-hacker.com/2024/07/23/whatsapp-trick-android-malware-can-impersonate-pdf-file/
https://www.mobile-hacker.com/2024/07/23/whatsapp-trick-android-malware-can-impersonate-pdf-file/
Mobile Hacker
WhatsApp trick: Android malware can impersonate PDF file
Exploiting this trick can easily mislead non-tech-savvy users into installing a malicious app that impersonates a PDF document. The trick lies in manipulating the file extension within the WhatsApp Messenger using API interface.
👍22❤4👎1😁1😱1
Android spyware named Ratel pretending to be Hamster Kombat game distributed via an unofficial Telegram channel
https://www.welivesecurity.com/en/eset-research/tap-estry-threats-targeting-hamster-kombat-players/
https://www.welivesecurity.com/en/eset-research/tap-estry-threats-targeting-hamster-kombat-players/
Welivesecurity
The tap-estry of threats targeting Hamster Kombat players
ESET research reveals how the success of Hamster Kombats has attracted malicious actors trying to abuse interest in the game for monetary gain.
🔥14🤣9😁3
How to install Kali NetHunter on TicWatch Pro 3
https://www.mobile-hacker.com/2024/07/25/how-to-install-kali-nethunter-on-ticwatch-pro-3/
https://www.mobile-hacker.com/2024/07/25/how-to-install-kali-nethunter-on-ticwatch-pro-3/
Mobile Hacker
How to install Kali NetHunter on TicWatch Pro 3
In previous series of blogs I focused on installation of Kali NetHunter on older model of TicWatch Pro 2018 (catfish) which might be for some of you a good choice if you already have them forgotten in your drawer or you can get them cheap to play around.…
🔥20👍6❤1
Vulnerability in Telegram for Android: Use-after-free in Connection::onReceivedData
https://bugs.chromium.org/p/project-zero/issues/detail?id=2547
https://bugs.chromium.org/p/project-zero/issues/detail?id=2547
👍10
Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps
https://www.zimperium.com/blog/unmasking-the-sms-stealer-targeting-several-countries-with-deceptive-apps/
https://www.zimperium.com/blog/unmasking-the-sms-stealer-targeting-several-countries-with-deceptive-apps/
Zimperium
Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps - Zimperium
true
👍10
Mandrake spyware sneaks onto Google Play again, flying under the radar for two years
https://securelist.com/mandrake-apps-return-to-google-play/113147/
https://securelist.com/mandrake-apps-return-to-google-play/113147/
Securelist
New Mandrake Android spyware version discovered on Google Play
Mandrake spyware threat actors resume attacks with new functionality targeting Android devices while being publicly available on Google Play
🤯8👍6
Android CraxsRAT strikes in Malaysia
https://www.group-ib.com/blog/craxs-rat-malaysia/
https://www.group-ib.com/blog/craxs-rat-malaysia/
Group-IB
Android Remote Access malware strikes in Malaysia | Group-IB Blog
Group-IB's investigation on a malware sample targeting a Malaysia-based financial organization's clients in the Asia-Pacific region.
🤡7🥱5❤2