Vulnerabilities in 5G
1) A protocol vulnerability in 4G and 5G specification that allows the fake base station to steal information about the device and mount identification attacks
2) Implementation vulnerability in cellular network operator equipment that can be exploited during a device registration phase
3) A protocol vulnerability that affects the battery life of low-powered devices
https://infosec.sintef.no/en/informasjonssikkerhet/2019/08/new-vulnerabilities-in-5g-security-architecture-countermeasures/
1) A protocol vulnerability in 4G and 5G specification that allows the fake base station to steal information about the device and mount identification attacks
2) Implementation vulnerability in cellular network operator equipment that can be exploited during a device registration phase
3) A protocol vulnerability that affects the battery life of low-powered devices
https://infosec.sintef.no/en/informasjonssikkerhet/2019/08/new-vulnerabilities-in-5g-security-architecture-countermeasures/
infosec.sintef.no
New vulnerabilities in 5G Security Architecture & Countermeasures (Part 1)
The 5G network promises to transform industries and our digital society by providing enhanced capacity, higher data rates, increased battery life for machine-type devices, higher availability and reduced power consumptions. In a way, 5G will act as a vehicle…
Remote Code Execution Vulnerabilities in Apple FaceTime #BlackHat
https://i.blackhat.com/USA-19/Thursday/us-19-Huang-Towards-Discovering-Remote-Code-Execution-Vulnerabilities-In-Apple-FaceTime.pdf
https://i.blackhat.com/USA-19/Thursday/us-19-Huang-Towards-Discovering-Remote-Code-Execution-Vulnerabilities-In-Apple-FaceTime.pdf
Attacking iPhone XS Max
https://i.blackhat.com/USA-19/Thursday/us-19-Wang-Attacking-IPhone-XS-Max.pdf
https://i.blackhat.com/USA-19/Thursday/us-19-Wang-Attacking-IPhone-XS-Max.pdf
Clicker Trojan Installed from Google Play by 102,000,000 Android Users #AdFraud
https://news.drweb.com/show/?i=13382&lng=en
https://news.drweb.com/show/?i=13382&lng=en
Dr.Web
Doctor Web: Clicker Trojan Installed from Google Play by Some 102,000,000 Android Users
Clicker trojans are widespread malicious programs, designed to increase website visit rates and earn money on online traffic. They simulate user actions on web pages by clicking on links and other interactive elements. Doctor Web virus analysts have detected…
Audio Recorder - Voice Recorder app with 1,000,000+ installs is subnoscription scam. After 3 days requests payment $199,99 per week.
https://twitter.com/WvuAlphaSoldier/status/1159712723518873601?s=19
https://twitter.com/WvuAlphaSoldier/status/1159712723518873601?s=19
Twitter
Jonathan Nichols
Yo! @GooglePlay WHAT THE ACTUAL FUCK!?!?
Malicious iPhone lightning cable
Looks like normal cable but it will give an attacker a way to remotely tap into your computer.
https://www.vice.com/amp/en_us/article/evj4qw/these-iphone-lightning-cables-will-hack-your-computer
O.MG cable: http://mg.lol/blog/omg-cable/
Looks like normal cable but it will give an attacker a way to remotely tap into your computer.
https://www.vice.com/amp/en_us/article/evj4qw/these-iphone-lightning-cables-will-hack-your-computer
O.MG cable: http://mg.lol/blog/omg-cable/
Vice
These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer
It looks like an Apple lightning cable. It works like an Apple lightning cable. But it will give an attacker a way to remotely tap into your computer.
Robocall blocking apps sends your private data without permission including TrapCall, Truecaller and Hiya apps
https://techcrunch.com/2019/08/09/many-robocall-blocking-apps-send-your-private-data-without-permission/
https://techcrunch.com/2019/08/09/many-robocall-blocking-apps-send-your-private-data-without-permission/
TechCrunch
Robocall blocking apps caught sending your data without permission
Robocall-blocking apps promise to rid your life of spoofed and spam phone calls. But are they as trustworthy as they claim to be? One security researcher
Mobile Security Penetration Testing List
https://hackersonlineclub.com/mobile-security-penetration-testing/
https://hackersonlineclub.com/mobile-security-penetration-testing/
Hackers Online Club
Mobile Security Penetration Testing List 2024
Mobile Security Penetration Testing List for All-in-one Mobile Security Frameworks including Android and iOS Application Penetration Testing.
Be careful when using shared devices
In-room tablets, phones in hotels, ordering tables in restaurants....
On some of them you can install TeamViewer to monitor all the activity.
https://twitter.com/JulienEhrhart/status/1160533140047351808?s=19
In-room tablets, phones in hotels, ordering tables in restaurants....
On some of them you can install TeamViewer to monitor all the activity.
https://twitter.com/JulienEhrhart/status/1160533140047351808?s=19
Twitter
Julien Ehrhart
Be very careful when you use complimentary in-room tablets or phones in hotels, they may lack proper security hardening. I was able to install @TeamViewer to monitor all the activity of the tablet (left) on my phone (right). Using @aavgohospitalit tablet…
Canon DSLR Camera can get infected with Ransomware over the air
https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/
https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/
Check Point Research
Say Cheese: Ransomware-ing a DSLR Camera - Check Point Research
Research by: Eyal Itkin TL;DR Cameras. We take them to every important life event, we bring them on our vacations, and we store them in a protective case to keep them safe during transit. Cameras are more than just a tool or toy; we entrust them with our…
Android Security & Malware
Remotely Stole Files Through iMessage on iOS 12.3.1 (CVE-2019-8646 by natashenka) https://youtu.be/ld2m0CPR1nM
The Remote, Interaction-less Attack Surface of the iPhone
Slides from BlackHat about RCEs in iPhone
http://i.blackhat.com/USA-19/Wednesday/us-19-Silvanovich-Look-No-Hands-The-Remote-Interactionless-Attack-Surface-Of-The-iPhone.pdf
Slides from BlackHat about RCEs in iPhone
http://i.blackhat.com/USA-19/Wednesday/us-19-Silvanovich-Look-No-Hands-The-Remote-Interactionless-Attack-Surface-Of-The-iPhone.pdf
History of the worst Android app ever: mAadhaar
Slides: https://github.com/fs0c131y/ConPresentations/blob/master/AppSecVillageDefcon27.mAadhaar.pdf
Presentation: https://youtu.be/1dnyV2Gd48A
Slides: https://github.com/fs0c131y/ConPresentations/blob/master/AppSecVillageDefcon27.mAadhaar.pdf
Presentation: https://youtu.be/1dnyV2Gd48A
GitHub
ConPresentations/AppSecVillageDefcon27.mAadhaar.pdf at master · fs0c131y/ConPresentations
Slide decks from my conference presentations. Contribute to fs0c131y/ConPresentations development by creating an account on GitHub.
Cerberus - A new banking Trojan from the underworld
https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html
https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html
Threatfabric
Cerberus - A new banking Trojan from the underworld — ThreatFabric
New Cerberus Android banking Trojan joins the threat-landscape at the moment that the banking malware rental business has no more leader. Read what to expect next.
Intercepting traffic from Android Flutter applications
https://blog.nviso.be/2019/08/13/intercepting-traffic-from-android-flutter-applications/
https://blog.nviso.be/2019/08/13/intercepting-traffic-from-android-flutter-applications/
NVISO Labs
Intercepting traffic from Android Flutter applications
Update: The explanation below explains the step for ARMv7. For ARMv8 (64bit), see this blogpost. ⚠️ Update August 2022 ⚠️An update to this blog post was written and can be found here. It …
Forwarded from The Bug Bounty Hunter
Bypass of biometrics security functionality is possible in Android application (com.shopify.mobile)
https://hackerone.com/reports/637194
https://hackerone.com/reports/637194
HackerOne
Shopify disclosed on HackerOne: Bypass of biometrics security...
# Summary
Shopify Android App has an option to sign in to the app using fingerprint. But if the application was open and someone triggers a "deeplink", authentication is no longer required.
##...
Shopify Android App has an option to sign in to the app using fingerprint. But if the application was open and someone triggers a "deeplink", authentication is no longer required.
##...
85 Adware Apps Found on Google Play Installed Over 8,000,000 Times
https://blog.trendmicro.com/trendlabs-security-intelligence/adware-posing-as-85-photography-and-gaming-apps-on-google-play-installed-over-8-million-times/
https://blog.trendmicro.com/trendlabs-security-intelligence/adware-posing-as-85-photography-and-gaming-apps-on-google-play-installed-over-8-million-times/
Trend Micro
Adware Posing as 85 Photography and Gaming Apps on Google Play Installed Over 8 Million Times
The mobile platform is ubiquitous — enabling users to make online transactions, run their everyday lives, or even use it in the workplace. It’s no surprise that fraudsters and cybercriminals would want to cash in on it. Delivering adware, for example, enables…
Android Security & Malware
Cerberus - A new banking Trojan from the underworld https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html
Cerberus - new Android Banking Trojan is active
-spreads via fake website as Adobe Flash Player
-video demo of its installation and stealing credentials from PayPal
https://twitter.com/ESETresearch/status/1162315627052306432
-spreads via fake website as Adobe Flash Player
-video demo of its installation and stealing credentials from PayPal
https://twitter.com/ESETresearch/status/1162315627052306432
Twitter
ESET research
#Cerberus, new Android banking Trojan is active and spreads via fake website as Flash Player. It has over 13K+ visits esp. from Japan 🇯🇵 and USA 🇺🇸. #ESETresearch's @LukasStefanko has been tracking it since July. Video of infection, installation and credentials…
❤1
Google Play now reviews all apps for at least three days for security reasons
✅ less harmful apps on Play Store
❌ security app updates could be delayed by 3 days
https://t.co/9gAnukJNFW
✅ less harmful apps on Play Store
❌ security app updates could be delayed by 3 days
https://t.co/9gAnukJNFW
Choice of Games LLC
Google Warns Developers that All New Android Apps Require Three Days for Approval
In conversation with Google Play Store developer support today, they confirmed to me that all new Android apps now require at least three days for approval.
Threat evolution Q2 2019 by Kaspersky
Top 10 mobile malware in Q2 2019:
1. DangerousObject.Multi.Generic
2. Trojan.AndroidOS.Boogr.gsh
3. DangerousObject.AndroidOS.GenericML
4. Trojan.AndroidOS.Hiddapp.cr
5. Trojan.AndroidOS.Hiddapp.ch
6. Trojan.AndroidOS.Hiddapp.cf
7. Trojan.AndroidOS.Hiddad.em
8. Trojan-Dropper.AndroidOS.Lezok.p
9. Trojan-Dropper.AndroidOS.Hqwar.bb
10.Trojan-Banker.AndroidOS.Asacub.a
https://securelist.com/it-threat-evolution-q2-2019-statistics/92053/
Top 10 mobile malware in Q2 2019:
1. DangerousObject.Multi.Generic
2. Trojan.AndroidOS.Boogr.gsh
3. DangerousObject.AndroidOS.GenericML
4. Trojan.AndroidOS.Hiddapp.cr
5. Trojan.AndroidOS.Hiddapp.ch
6. Trojan.AndroidOS.Hiddapp.cf
7. Trojan.AndroidOS.Hiddad.em
8. Trojan-Dropper.AndroidOS.Lezok.p
9. Trojan-Dropper.AndroidOS.Hqwar.bb
10.Trojan-Banker.AndroidOS.Asacub.a
https://securelist.com/it-threat-evolution-q2-2019-statistics/92053/
Securelist
IT threat evolution Q2 2019. Statistics
Kaspersky solutions blocked 717,057,912 attacks launched from online resources in 203 countries across the globe, 217,843,293 unique URLs triggered Web Anti-Virus components.
Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers.
Vulnerability was fixed in iOS 12.3 but Apple "unfixed" in iOS 12.4
https://www.vice.com/amp/en_us/article/qvgp77/hacker-releases-first-public-iphone-jailbreak-in-years
Vulnerability was fixed in iOS 12.3 but Apple "unfixed" in iOS 12.4
https://www.vice.com/amp/en_us/article/qvgp77/hacker-releases-first-public-iphone-jailbreak-in-years
Vice
Hacker Releases First Public Jailbreak for Up-to-Date iPhones in Years
Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers.