Detailed analysis of Android banking trojan Geost
https://blog.trendmicro.com/trendlabs-security-intelligence/dissecting-geost-exposing-the-anatomy-of-the-android-trojan-targeting-russian-banks/
https://blog.trendmicro.com/trendlabs-security-intelligence/dissecting-geost-exposing-the-anatomy-of-the-android-trojan-targeting-russian-banks/
Trend Micro
Geost: Anatomy of the Android Trojan Targeting Russia
We dug deeper into the behavior of Geost, a trojan targetting Russian banks, by reverse engineering a sample of the malware. It has several layers of obfuscation, encryption, reflection that made it more difficult to reverse engineer.
Android malware mimics click farms - fake review bussiness
This Trojan misuses Accessibility to perform:
- Download Apps from Google Play or APK Pure
- Deactivate Google Play Protect
- Create Fake Accounts with OAuth
- Post fake reviews on Google Play
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-leifaccess-a-is-the-silent-fake-reviewer-trojan/
This Trojan misuses Accessibility to perform:
- Download Apps from Google Play or APK Pure
- Deactivate Google Play Protect
- Create Fake Accounts with OAuth
- Post fake reviews on Google Play
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-leifaccess-a-is-the-silent-fake-reviewer-trojan/
McAfee Blog
Android/LeifAccess.A is the Silent Fake Reviewer Trojan | McAfee Blog
The McAfee Mobile Research team has identified an Android malware family dubbed Android/LeifAccess.A that has been active since May 2019. This trojan was
Iran built a COVID-19 detection app that it urged citizens to install on their devices
https://www.zdnet.com/article/spying-concerns-raised-over-irans-official-covid-19-detection-app/
https://www.zdnet.com/article/spying-concerns-raised-over-irans-official-covid-19-detection-app/
ZDNET
Spying concerns raised over Iran's official COVID-19 detection app
Google removes Iran's official COVID-19 detection app from the Play Store.
Here's how well 17 Android Security Apps Provide Protection
https://www.av-test.org/en/news/here-s-how-well-17-android-security-apps-provide-protection/
https://www.av-test.org/en/news/here-s-how-well-17-android-security-apps-provide-protection/
www.av-test.org
Here's how well 17 Android Security Apps Provide Protection
Google ensures that each app in the Play Store and on smartphones is checked for Trojans and other kinds of malware. The current test shows that Android users are much safer with security apps than if they rely on Google. Here are the facts.
Analysis of Latest Android Binder vulnerability (CVE-2020-0041)
Blogpost: https://www.synacktiv.com/posts/exploit/binder-analysis-and-exploitation-of-cve-2020-0041.html
Slides: https://www.synacktiv.com/ressources/thcon2020_binder.pdf
Blogpost: https://www.synacktiv.com/posts/exploit/binder-analysis-and-exploitation-of-cve-2020-0041.html
Slides: https://www.synacktiv.com/ressources/thcon2020_binder.pdf
Play fuzzing machine – hunting iOS/macOS kernel vulnerabilities automatically and smartly
https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-play-fuzzing-machine-hunting-iosmacos-kernel-vulnerabilities-automatically-and-smartly/
https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-play-fuzzing-machine-hunting-iosmacos-kernel-vulnerabilities-automatically-and-smartly/
Virusbulletin
Virus Bulletin :: VB2019 paper: Play fuzzing machine – hunting iOS/macOS kernel vulnerabilities automatically and smartly
Since iOS 10, Apple has released the unpacked/decrypted kernel cache (*.ipsw), but the system source code, in particular the kernel and driver part, remain close-sourced. What is more, symbol info in the binary (kernel cache) has been greatly removed, which…
End of Android rooting tool - Magisk
Android SafetyNet will enforce key attestation to verify device status
Info: https://twitter.com/topjohnwu/status/1237656703929180160
Q&A: https://twitter.com/topjohnwu/status/1237830555523149824
Android SafetyNet will enforce key attestation to verify device status
Info: https://twitter.com/topjohnwu/status/1237656703929180160
Q&A: https://twitter.com/topjohnwu/status/1237830555523149824
Twitter
John Wu
So here we go, after years of fun messing around using Magisk, it seems that Google FINALLY decided to "fix" SafetyNet to something useful, and that is to use key attestation to verify device status (after 3 years since introduced to Android's platform!)
Cookiethief: a cookie-stealing Trojan for Android
https://securelist.com/cookiethief/96332/
https://securelist.com/cookiethief/96332/
Securelist
Cookiethief: a cookie-stealing Trojan for Android
Trojan-Spy.AndroidOS.Cookiethief turned out to be quite simple. Its main task was to acquire root rights on the victim device, and transfer cookies used by the browser and Facebook app to the cybercriminals’ server.
Android "coronavirus" malware tracker 📱🦠
https://lukasstefanko.com/2020/03/android-coronavirus-malware.html
https://lukasstefanko.com/2020/03/android-coronavirus-malware.html
Android MonitorMinor stalkerware
When Accessibility services become stalkerware services
https://securelist.com/monitorminor-vicious-stalkerware/95575/
When Accessibility services become stalkerware services
https://securelist.com/monitorminor-vicious-stalkerware/95575/
Securelist
MonitorMinor: vicious stalkerware?
The other day, our Android traps ensnared an interesting specimen of software that can be used for stalking. On closer inspection, we found that this app outstrips all existing software of its class in terms of functionality.
Commercial surveillance tools exploit COVID-19 to spread (MobiHok, SpyNote, SpyMax)
Source: https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19
Source: https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19
Lookout
Commercial Surveillanceware Operators Exploit COVID-19 | Threat Intel
Are cybercriminals and scammer's taking advantage of increased communication around COVID-19? Discovery shows new surveillanceware exploits the pandemic.
New malware protections for Advanced Protection users
https://blog.google/products/android/new-malware-protections-advanced-protection-users/amp/
https://blog.google/products/android/new-malware-protections-advanced-protection-users/amp/
Google
New malware protections for Advanced Protection users
Android is launching new features for Advanced Protection Program users to automatically protect them from malware.
Getting Started in Android apps Pen-testing (PART-1)
https://blog.securitybreached.org/2020/03/17/getting-started-in-android-apps-pentesting/
https://blog.securitybreached.org/2020/03/17/getting-started-in-android-apps-pentesting/
Security Breached Blog
Getting Started in Android Apps Pen-testing (Part-1)
Pen-testing android apps require different methodologies than web applications. The difference is that you have to figure out by different methods.
Over 50 apps found on Play Store contained ad-fraud functionality
https://thehackernews.com/2020/03/android-apps-ad-fraud.html
https://thehackernews.com/2020/03/android-apps-ad-fraud.html
👍1
TrickBot banking malware uses Android component to bypass 2FA
https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/
https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/
Security Intelligence
TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany
Our team is closely monitoring TrickBot's developing capabilities, including its new cross-channel attacks using the TrickMo component.
Autopsy of the Most Stable MediaTek Rootkit CVE-2020-0069
https://blog.quarkslab.com/cve-2020-0069-autopsy-of-the-most-stable-mediatek-rootkit.html
https://blog.quarkslab.com/cve-2020-0069-autopsy-of-the-most-stable-mediatek-rootkit.html
Quarkslab
CVE-2020-0069: Autopsy of the Most Stable MediaTek Rootkit - Quarkslab's blog
In March 2020, Google patched a critical vulnerability affecting many MediaTek based devices. This vulnerability had been known by MediaTek since April 2019, and later exploited in the wild! In this post, we give some details about this vulnerability and…
Android.Circle adware trojan found on Google Play is capable of executing BeanShell noscripts
https://news.drweb.com/show/?i=13740&lng=en
Samples: https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.Circle/README.adoc
https://news.drweb.com/show/?i=13740&lng=en
Samples: https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.Circle/README.adoc
Dr.Web
Android.Circle.1 adware trojan found on Google Play is capable of executing BeanShell noscripts
Analysis of new Android banking Trojan - Eventbot (chinese)
https://ti.qianxin.com/blog/articles/new-bank-trojan-eventbot-affects-234-financial-applications/
https://ti.qianxin.com/blog/articles/new-bank-trojan-eventbot-affects-234-financial-applications/
Qianxin
奇安信威胁情报中心
Nuxt.js project