Mobile malware evolution in 2019 by Kaspersky
-slightly more ransomware
-slightly less banking Trojans
-more adware
-more stalkerware
https://securelist.com/mobile-malware-evolution-2019/96280/
-slightly more ransomware
-slightly less banking Trojans
-more adware
-more stalkerware
https://securelist.com/mobile-malware-evolution-2019/96280/
Securelist
Mobile malware evolution 2019
In 2019, Kaspersky mobile products and technologies detected 3,503,952 malicious installation packages, 69,777 new mobile banking Trojans and 68,362 new mobile ransomware Trojans.
How to setup a proxy for security testing in iOS13
https://medium.com/@agu3rra/how-to-setup-a-proxy-for-security-testing-in-ios13-242892e1bf3f
https://medium.com/@agu3rra/how-to-setup-a-proxy-for-security-testing-in-ios13-242892e1bf3f
Medium
How to setup a proxy for security testing in iOS13
So you want to do hunt for bugs in Bug Bounty programs that allow testing of iOS applications, but couldn’t figure out how to take a pick…
KrØØk: Vulnerability affected encryption of billion+ Wi‑Fi devices (iPhone, iPad, Nexus, Samsung Galaxy, RedMi...)
CVE-2019-15126 causes vulnerable devices to use an all-zero encryption key to encrypt part of the user’s communication.
This allows an adversary to decrypt some wireless network packets transmitted by a vulnerable device.
https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/
CVE-2019-15126 causes vulnerable devices to use an all-zero encryption key to encrypt part of the user’s communication.
This allows an adversary to decrypt some wireless network packets transmitted by a vulnerable device.
https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/
WeLiveSecurity
KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices
ESET researchers uncovered a security flaw affecting Wi-Fi chips that are commonly used in devices such as smartphones, tablets, laptops, and IoT gadgets.
👍1
2020 - Year of the RAT
-Cerberus
-Gustuff
-Hydra
-Ginp
-Anubis
https://www.threatfabric.com/blogs/2020_year_of_the_rat.html
-Cerberus
-Gustuff
-Hydra
-Ginp
-Anubis
https://www.threatfabric.com/blogs/2020_year_of_the_rat.html
ThreatFabric
2020 - Year of the RAT
From simple SMS-stealer to fully-fledged RAT with ATS, criminals continuously innovate to remain successful. This blog provides an overview of the latest trends and expected evolutions in the land of banking Trojans.
LTE Network issue could allow attackers to imporsonate 4G mobile users
https://imp4gt-attacks.net/
https://imp4gt-attacks.net/
What to Look for When Reverse Engineering Android Apps
https://www.nowsecure.com/blog/2020/02/26/what-to-look-for-when-reverse-engineering-android-apps/
https://www.nowsecure.com/blog/2020/02/26/what-to-look-for-when-reverse-engineering-android-apps/
Nowsecure
What to Look for When Reverse Engineering Android Apps - NowSecure
This tutorial will help you master the basics of analyzing an Android app and knowing what to look for as you work to reverse engineer the product.
How to emulate an Android ARM32 and/or ARM64 native library, and an experimental iOS ARM32 emulation
https://github.com/zhkl0228/unidbg
https://github.com/zhkl0228/unidbg
GitHub
GitHub - zhkl0228/unidbg: Allows you to emulate an Android native library, and an experimental iOS emulation
Allows you to emulate an Android native library, and an experimental iOS emulation - zhkl0228/unidbg
A mysterious bug in the firmware of Google's Titan M chip (CVE-2019-9465)
https://alexbakker.me/post/mysterious-google-titan-m-bug-cve-2019-9465.html
https://alexbakker.me/post/mysterious-google-titan-m-bug-cve-2019-9465.html
Alexander Bakker's Blog
A mysterious bug in the firmware of Google's Titan M chip (CVE-2019-9465)
Starting with the release of the Pixel 3, all of Google's Pixel Android smartphones come with the Titan M security chip on board. When I realized the Pixel 3a XL I purchased also had it, I decided to try to take advantage of it in an app I work on. It turned…
Detect static and dynamic tampering of native code
https://darvincitech.wordpress.com/2020/03/01/yet-another-tamper-detection-in-android/
https://darvincitech.wordpress.com/2020/03/01/yet-another-tamper-detection-in-android/
Darvin's Blog
Yet Another Tamper Detection in Android
Android apps are signed by developer private key before uploading to the play store. Every private key has an associated public certificate that devices and services use to verify that the app is f…
Roaming Mantis, part V
SMiShing and enhanced anti-researcher techniques
https://securelist.com/roaming-mantis-part-v/96250/
SMiShing and enhanced anti-researcher techniques
https://securelist.com/roaming-mantis-part-v/96250/
Securelist
Roaming Mantis, part V
Kaspersky has continued to track the Roaming Mantis campaign. The group’s attack methods have improved and new targets continuously added in order to steal more funds.
Bug in Walgreens mobile app (pharmacy app) leaked users' personal data
The app has over 10M installs on Google Play
https://www.zdnet.com/article/walgreens-says-mobile-app-leaked-users-personal-data/
The app has over 10M installs on Google Play
https://www.zdnet.com/article/walgreens-says-mobile-app-leaked-users-personal-data/
ZDNet
Walgreens says mobile app leaked users' personal data
US pharmacy store says mobile app exposed names, prenoscription details, and shipping addresses.
Android Malware Threats - February, 2020
http://skptr.me/malware_timeline_2020.html
samples: https://github.com/sk3ptre/AndroidMalware_2020
http://skptr.me/malware_timeline_2020.html
samples: https://github.com/sk3ptre/AndroidMalware_2020
GitHub
GitHub - sk3ptre/AndroidMalware_2020: Popular Android malware seen in 2020
Popular Android malware seen in 2020. Contribute to sk3ptre/AndroidMalware_2020 development by creating an account on GitHub.
Temp root vulnerability that affects millions of devices with chipsets from MediaTek - CVE-2020-0069
Exploit has been available on XDA-Developers forums since April 2019.
The vulnerability is actively being exploited in the wild.
https://www.xda-developers.com/mediatek-su-rootkit-exploit/
Exploit has been available on XDA-Developers forums since April 2019.
The vulnerability is actively being exploited in the wild.
https://www.xda-developers.com/mediatek-su-rootkit-exploit/
XDA Developers
Critical MediaTek rootkit affecting millions of Android devices has been out in the open for months
A critical flaw in MediaTek processors went unpatched in devices due to OEM neglect. Google hopes the March 2020 Android Security Bulletin will fix this.
Google Authenticator for Android Allows Screen Capture (FLAG_SECURE)
https://wwws.nightwatchcybersecurity.com/2020/03/03/google-authenticator-for-android-allows-screen-capture/
https://wwws.nightwatchcybersecurity.com/2020/03/03/google-authenticator-for-android-allows-screen-capture/
Nightwatch Cybersecurity
Google Authenticator for Android Allows Screen Capture
Google offers an application for Android called “Google Authenticator” which is used to setup two-factor authentication (2FA). This application is used to generate standard OTP codes us…
How to Jailbreak iPhone with rooted Android (checkra1n)
https://www.xda-developers.com/jailbreak-apple-iphone-using-checkra1n-rooted-android-phone/
https://www.xda-developers.com/jailbreak-apple-iphone-using-checkra1n-rooted-android-phone/
XDA
Your rooted Android phone can jailbreak an iPhone with checkra1n
You can now jailbreak several popular iPhones using your rooted Android smartphone, thanks to checkra1n and its recent Linux support. Check it out!
Android app - CM Browser - records all users' web browsing and send it to server
The app is removed from Google Play store now
https://www.forbes.com/sites/thomasbrewster/2020/03/03/warning-an-android-security-app-with-1-billion-downloads-is-recording-users-web-browsing/#27797cf62149
The app is removed from Google Play store now
https://www.forbes.com/sites/thomasbrewster/2020/03/03/warning-an-android-security-app-with-1-billion-downloads-is-recording-users-web-browsing/#27797cf62149
Forbes
Warning: An Android Security App With 1 Billion Downloads Is Recording Users’ Web Browsing
China’s Cheetah Mobile says it needs to monitor users of its wildly popular Android apps. Security experts disagree, and Google has stuck by its ban on Cheetah software.
👍1
Project Sandcastle: Android for the iPhone
https://projectsandcastle.org/
https://projectsandcastle.org/
Project Sandcastle
IT’S ANDROID. FOR THE IPHONE.
McAfee Mobile Threat Report - Q1 2020
https://www.mcafee.com/content/dam/consumer/en-us/docs/2020-Mobile-Threat-Report.pdf
https://www.mcafee.com/content/dam/consumer/en-us/docs/2020-Mobile-Threat-Report.pdf
Detailed analysis of Android banking trojan Geost
https://blog.trendmicro.com/trendlabs-security-intelligence/dissecting-geost-exposing-the-anatomy-of-the-android-trojan-targeting-russian-banks/
https://blog.trendmicro.com/trendlabs-security-intelligence/dissecting-geost-exposing-the-anatomy-of-the-android-trojan-targeting-russian-banks/
Trend Micro
Geost: Anatomy of the Android Trojan Targeting Russia
We dug deeper into the behavior of Geost, a trojan targetting Russian banks, by reverse engineering a sample of the malware. It has several layers of obfuscation, encryption, reflection that made it more difficult to reverse engineer.
Android malware mimics click farms - fake review bussiness
This Trojan misuses Accessibility to perform:
- Download Apps from Google Play or APK Pure
- Deactivate Google Play Protect
- Create Fake Accounts with OAuth
- Post fake reviews on Google Play
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-leifaccess-a-is-the-silent-fake-reviewer-trojan/
This Trojan misuses Accessibility to perform:
- Download Apps from Google Play or APK Pure
- Deactivate Google Play Protect
- Create Fake Accounts with OAuth
- Post fake reviews on Google Play
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-leifaccess-a-is-the-silent-fake-reviewer-trojan/
McAfee Blog
Android/LeifAccess.A is the Silent Fake Reviewer Trojan | McAfee Blog
The McAfee Mobile Research team has identified an Android malware family dubbed Android/LeifAccess.A that has been active since May 2019. This trojan was
Iran built a COVID-19 detection app that it urged citizens to install on their devices
https://www.zdnet.com/article/spying-concerns-raised-over-irans-official-covid-19-detection-app/
https://www.zdnet.com/article/spying-concerns-raised-over-irans-official-covid-19-detection-app/
ZDNET
Spying concerns raised over Iran's official COVID-19 detection app
Google removes Iran's official COVID-19 detection app from the Play Store.