How Edward Snowden Would Use A Smartphone
-Graphene OS
-all traffic through TOR
-use ad-blocker and password manager
-use Signal or Wire
-...
https://www.eva.nmccann.net/blog/snowden-smartphone
-Graphene OS
-all traffic through TOR
-use ad-blocker and password manager
-use Signal or Wire
-...
https://www.eva.nmccann.net/blog/snowden-smartphone
McCann Tech
How Edward Snowden Would Use A Smartphone — McCann Tech
How Edward Snowden would use a smartphone, if he had to.
Pwnedbg - debugging the iOS kernel in IDA
https://akayn.github.io/2019/09/21/debugging-the-ios-kernel-in-ida.html
https://akayn.github.io/2019/09/21/debugging-the-ios-kernel-in-ida.html
25 hidden adware found on Google Play with over 2,100,000 installs
https://www.symantec.com/blogs/threat-intelligence/hidden-adware-google-play
https://www.symantec.com/blogs/threat-intelligence/hidden-adware-google-play
Security
More Hidden App Malware Found on Google Play with over 2.1 Million Downloads
Malicious apps hide themselves after installation and aggressively display full-screen advertisements.
Tibetan Groups Targeted with 1-Click Mobile Exploits. Espionage campaign for iOS and Android OS
https://citizenlab.ca/2019/09/poison-carp-tibetan-groups-targeted-with-1-click-mobile-exploits/
IOCs: https://github.com/citizenlab/malware-indicators/blob/master/201909_MissingLink/iocs.csv
https://citizenlab.ca/2019/09/poison-carp-tibetan-groups-targeted-with-1-click-mobile-exploits/
IOCs: https://github.com/citizenlab/malware-indicators/blob/master/201909_MissingLink/iocs.csv
The Citizen Lab
Missing Link
This is the first documented case of one-click mobile exploits used to target Tibetan groups, and reflects an escalation in the sophistication of digital espionage threats targeting the community.
Android Spying Trojan impersonates Korean National Police Agency app that spreads via fake websites that mimic Google Play
https://twitter.com/ninoseki/status/1176732200873578496
https://twitter.com/ninoseki/status/1176732200873578496
Twitter
にのせき
Unknown(?) Android malware impersonates Korean National Police Agency. https://t.co/jdkz6rnoqe A list of URLs: https://t.co/rM9lvNBi3M FYI @051R15 @ZeroCERT @unpacker @kisa118
29 Hidden Ads trojans with 10,900,000+ installs found on Google Play
https://blogs.quickheal.com/quick-heal-reports-29-malicious-apps-10-million-downloads-google-play-store/
https://blogs.quickheal.com/quick-heal-reports-29-malicious-apps-10-million-downloads-google-play-store/
Quick Heal Blog | Latest computer security news, tips, and advice
Quick Heal reports 29 malicious apps with 10 million+ downloads on Google Play Store
Quick Heal Security Labs reported 29 malicious apps found on Google Play Store, which have a collective download count of more than 10 Millions. Google was quick enough to remove these malicious apps from Play Store immediately. One of the Apps from this…
Subnoscription Scam apps found on Google Play
▪️15 apps with 20,000,000+ installs
▪️some of the apps requests €219.99 payment after 3-day trial
http://news.sophos.com/en-us/2019/09/25/fleeceware-apps-overcharge-users-for-basic-app-functionality/
▪️15 apps with 20,000,000+ installs
▪️some of the apps requests €219.99 payment after 3-day trial
http://news.sophos.com/en-us/2019/09/25/fleeceware-apps-overcharge-users-for-basic-app-functionality/
Sophos News
‘Fleeceware’ apps overcharge users for basic app functionality
Unscrupulous publishers take advantage of Play Market policy loopholes to charge app users hundreds of dollars
Two adware apps with 600,000+ installs found on Google Play
These apps were updated in 2016. This means, that they contain adware code for over 3 years.
https://twitter.com/ReBensk/status/1176728626290552832
These apps were updated in 2016. This means, that they contain adware code for over 3 years.
https://twitter.com/ReBensk/status/1176728626290552832
Twitter
Re-ind
AdDisplay.Youmi - 2 apps Found on Google Play mobi.bihu.recovery.file 500,000+ Installs https://t.co/EsTEDS5CRa 100,000+ Installs https://t.co/4MJ1D3Frfd https://t.co/cVoUgMzQGz
Google quietly removed at least 46 apps from the Play store belonging to iHandy, a major Chinese mobile developer.
Either Google or developer doesn't explain why.
https://www.buzzfeednews.com/article/craigsilverman/sweet-camera-play-store-removed-ihandy
Either Google or developer doesn't explain why.
https://www.buzzfeednews.com/article/craigsilverman/sweet-camera-play-store-removed-ihandy
BuzzFeed News
Google Removed Dozens Of Android Apps From A Major Chinese Developer Due To "Deceptive Or Disruptive Ads"
This is the third time in recent months that Google has mass-removed apps from a big Chinese developer due to ad violations.
Fake Antivirus app found on Google Play with 10,000+ installs
It's based on whitelisting/blacklisting package names or activities. Doesn't receive any updates.
https://twitter.com/ReBensk/status/1177487851895676928
It's based on whitelisting/blacklisting package names or activities. Doesn't receive any updates.
https://twitter.com/ReBensk/status/1177487851895676928
Twitter
Re-ind
Fake-AV Found on Google Play 10,000+ Installs Display Ads with full screen https://t.co/G3mFIcDnbI
Fake apps spread on iOS App Store and Google Play
IoC:
11 apps on iOS App Store
15 apps on Google Play
https://blog.trendmicro.com/trendlabs-security-intelligence/gambling-apps-sneak-top-100-hundreds-fake-apps-spread-app-store-google-play/
IoC:
11 apps on iOS App Store
15 apps on Google Play
https://blog.trendmicro.com/trendlabs-security-intelligence/gambling-apps-sneak-top-100-hundreds-fake-apps-spread-app-store-google-play/
Trend Micro
Hundreds of Fake Apps in iOS App Store and Google Play
We found hundreds of the fake apps on iOS App Store and Google Play, with denoscriptions that are inconsistent with their content. They could transform into gambling apps that may violate local government regulations and app store policies.
EPIC JAILBREAK: Permanent unpatchable bootrom exploit for hundreds of millions of iOS devices.
Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip). via @axi0mX
https://github.com/axi0mX/ipwndfu/blob/master/README.md
Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip). via @axi0mX
https://github.com/axi0mX/ipwndfu/blob/master/README.md
GitHub
ipwndfu/README.md at master · axi0mX/ipwndfu
open-source jailbreaking tool for many iOS devices - axi0mX/ipwndfu
How to dump and debug the bootrom (SecureROM) on demoted devices with Apple’s official tools. #iOS
1/ connect the cable using the correct lighting orientation and launch astris
https://twitter.com/1nsane_dev/status/1177856941139337216?s=19
1/ connect the cable using the correct lighting orientation and launch astris
https://twitter.com/1nsane_dev/status/1177856941139337216?s=19
Twitter
Giulio Zompetti
@axi0mX’s #checkm8 is out and let’s you debug your device (up to A11). But how is this done? Here is a little thread on dumping the bootrom (SecureROM) on demoted devices with Apple’s official tools. 1/ connect the cable using the correct lighting orientation…
Data breach of 218 million users affected all Android and iOS game players who signed up for the Words With Friends game
Leaked:
▪️Names
▪️Email addresses
▪️Login IDs
▪️Hashed passwords, SHA1 with salt
Password reset token (if ever requested)
▪️Phone numbers (if provided)
▪️Facebook ID (if connected)
▪️Zynga account ID
https://thehackernews.com/2019/09/zynga-game-hacking.html
Leaked:
▪️Names
▪️Email addresses
▪️Login IDs
▪️Hashed passwords, SHA1 with salt
Password reset token (if ever requested)
▪️Phone numbers (if provided)
▪️Facebook ID (if connected)
▪️Zynga account ID
https://thehackernews.com/2019/09/zynga-game-hacking.html
Vulnerability in WIB sim-browser can make a phone call, send SMS to any phone numbers, send victim’s location, launch WAP browser, etc.
https://ginnoslab.org/2019/09/21/wibattack-vulnerability-in-wib-sim-browser-can-let-attackers-globally-take-control-of-hundreds-of-millions-of-the-victim-mobile-phones-worldwide-to-make-a-phone-call-send-sms-to-any-phone-numbers/
https://ginnoslab.org/2019/09/21/wibattack-vulnerability-in-wib-sim-browser-can-let-attackers-globally-take-control-of-hundreds-of-millions-of-the-victim-mobile-phones-worldwide-to-make-a-phone-call-send-sms-to-any-phone-numbers/
Jailbreaking iPhone X iOS 13.1.1 in 2 seconds with checkm8
https://twitter.com/axi0mX/status/1178299323328499712
https://twitter.com/axi0mX/status/1178299323328499712
X (formerly Twitter)
axi0mX (@axi0mX) on X
HACKED! Verbose booting iPhone X looks pretty cool. Starting in DFU Mode, it took 2 seconds to jailbreak it with checkm8, and then I made it automatically boot from NAND with patches for verbose boot. Latest iOS 13.1.1, and no need to upload any images. Thanks…
Infographic: 10 mobile security misconceptions
https://www.wandera.com/mobile-security/mobile-security-misconceptions/
https://www.wandera.com/mobile-security/mobile-security-misconceptions/
Seven HiddenApp Trojans found on Google Play with 310,000+ installs
https://twitter.com/0xabc0/status/1178606985404653568?s=19
https://twitter.com/0xabc0/status/1178606985404653568?s=19
Twitter
Ahmet Bilal Can
#adware total of 310k+ installs Apps will drop another apk after reboot ( RECEIVE_BOOT_COMPLETED) . Strings are encrypted with base64+rc4 https://t.co/l4zom7Fwou
Android Application Security - OWASP MSTG Uncrackable level 1 writeup
https://blog.0daylabs.com/2019/09/18/deep-dive-into-Android-security/
https://blog.0daylabs.com/2019/09/18/deep-dive-into-Android-security/
0Daylabs
Dive deep into Android Application Security - OWASP MSTG Uncrackable level 1 writeup
Uncrackable Apps for Android is a collection of mobile reversing challenges maintained by the OWASP MSTG (Mobile Security Testing Guide) authors. Cracking and solving these challenges is a fun way to learn Android security.