Android Security & Malware – Telegram
Android Security & Malware
43.2K subscribers
127 photos
19 videos
7 files
2.68K links
Mobile cybersecurity channel
Links: https://linktr.ee/mobilehacker
Contact: mobilehackerofficial@gmail.com
Download Telegram
Roaming Mantis(MoqHao/XLoader): spreads via SMShing

Distribution:
Infected Android device sends a SMS with a bit.ly link that links to a Tumblr blog that redirects to a malicous landing page.
https://hitcon.org/2019/CMT/slide-files/d2_s1_r1.pdf
Review of harmful apps found on Google Play in August 2019

Summary: 204 apps with over 438,400,00 installs.
https://lukasstefanko.com/2019/09/android-security-monthly-recap-8.html
Price For Mobile Exploits

For the first time Zerodium pays more for Android then iOS.
https://zerodium.com/program.html#changelog
Android Spy that signs you for SMS premium subnoscription (€6,71 per week) found in 24 apps on Google Play with 472,000+ installs

-campaign started in June 2019
-targets 37 countries
-can steal victim SMS, contact list + perform AdFraud
https://medium.com/csis-techblog/analysis-of-joker-a-spy-premium-subnoscription-bot-on-googleplay-9ad24f044451
Hack iOS or Computer via USB cable

Cable controlled remotely from Wifi.
Capable of :
-screen recording on SD card
-screen live stream via Wifi
-used as remote mouse + keyboard
http://blog.lambdaconcept.com/doku.php?id=research:graywire
0-day Privilege Escalation Vulnerability in Android

Not patched. No exploit available.
Can by exploited by malicious app that could gain root privileges on infected device.
https://www.zerodayinitiative.com/advisories/ZDI-19-780/
Indian 🇮🇳 face recogintion app was leaking: suspect & submited photo, OTP codes, police officers using app, admin password.

After report they: restricted db access, removed app from Google Play, removed their Twitter account and Firebase db. BTW this company works for Indian government.
https://twitter.com/olihough86/status/1169641409592381440
Heap Overflows and the iOS Kernel Heap - Case Study from an in-the-wild iOS 0-Day. #Part2

Learn how the exploit developer used a clever vulnerability-conversion to turn a heap-overflow into an artificial Use-After-Free.
https://azeria-labs.com/heap-overflows-and-the-ios-kernel-heap/
Bug in Telegram that didn't remove not sent videos and pictures from device
https://www.inputzero.io/2019/09/telegram-privacy-fails-again.html