Play fuzzing machine – hunting iOS/macOS kernel vulnerabilities automatically and smartly
https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-play-fuzzing-machine-hunting-iosmacos-kernel-vulnerabilities-automatically-and-smartly/
https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-play-fuzzing-machine-hunting-iosmacos-kernel-vulnerabilities-automatically-and-smartly/
Virusbulletin
Virus Bulletin :: VB2019 paper: Play fuzzing machine – hunting iOS/macOS kernel vulnerabilities automatically and smartly
Since iOS 10, Apple has released the unpacked/decrypted kernel cache (*.ipsw), but the system source code, in particular the kernel and driver part, remain close-sourced. What is more, symbol info in the binary (kernel cache) has been greatly removed, which…
End of Android rooting tool - Magisk
Android SafetyNet will enforce key attestation to verify device status
Info: https://twitter.com/topjohnwu/status/1237656703929180160
Q&A: https://twitter.com/topjohnwu/status/1237830555523149824
Android SafetyNet will enforce key attestation to verify device status
Info: https://twitter.com/topjohnwu/status/1237656703929180160
Q&A: https://twitter.com/topjohnwu/status/1237830555523149824
Twitter
John Wu
So here we go, after years of fun messing around using Magisk, it seems that Google FINALLY decided to "fix" SafetyNet to something useful, and that is to use key attestation to verify device status (after 3 years since introduced to Android's platform!)
Cookiethief: a cookie-stealing Trojan for Android
https://securelist.com/cookiethief/96332/
https://securelist.com/cookiethief/96332/
Securelist
Cookiethief: a cookie-stealing Trojan for Android
Trojan-Spy.AndroidOS.Cookiethief turned out to be quite simple. Its main task was to acquire root rights on the victim device, and transfer cookies used by the browser and Facebook app to the cybercriminals’ server.
Android "coronavirus" malware tracker 📱🦠
https://lukasstefanko.com/2020/03/android-coronavirus-malware.html
https://lukasstefanko.com/2020/03/android-coronavirus-malware.html
Android MonitorMinor stalkerware
When Accessibility services become stalkerware services
https://securelist.com/monitorminor-vicious-stalkerware/95575/
When Accessibility services become stalkerware services
https://securelist.com/monitorminor-vicious-stalkerware/95575/
Securelist
MonitorMinor: vicious stalkerware?
The other day, our Android traps ensnared an interesting specimen of software that can be used for stalking. On closer inspection, we found that this app outstrips all existing software of its class in terms of functionality.
Commercial surveillance tools exploit COVID-19 to spread (MobiHok, SpyNote, SpyMax)
Source: https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19
Source: https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19
Lookout
Commercial Surveillanceware Operators Exploit COVID-19 | Threat Intel
Are cybercriminals and scammer's taking advantage of increased communication around COVID-19? Discovery shows new surveillanceware exploits the pandemic.
New malware protections for Advanced Protection users
https://blog.google/products/android/new-malware-protections-advanced-protection-users/amp/
https://blog.google/products/android/new-malware-protections-advanced-protection-users/amp/
Google
New malware protections for Advanced Protection users
Android is launching new features for Advanced Protection Program users to automatically protect them from malware.
Getting Started in Android apps Pen-testing (PART-1)
https://blog.securitybreached.org/2020/03/17/getting-started-in-android-apps-pentesting/
https://blog.securitybreached.org/2020/03/17/getting-started-in-android-apps-pentesting/
Security Breached Blog
Getting Started in Android Apps Pen-testing (Part-1)
Pen-testing android apps require different methodologies than web applications. The difference is that you have to figure out by different methods.
Over 50 apps found on Play Store contained ad-fraud functionality
https://thehackernews.com/2020/03/android-apps-ad-fraud.html
https://thehackernews.com/2020/03/android-apps-ad-fraud.html
👍1
TrickBot banking malware uses Android component to bypass 2FA
https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/
https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/
Security Intelligence
TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany
Our team is closely monitoring TrickBot's developing capabilities, including its new cross-channel attacks using the TrickMo component.
Autopsy of the Most Stable MediaTek Rootkit CVE-2020-0069
https://blog.quarkslab.com/cve-2020-0069-autopsy-of-the-most-stable-mediatek-rootkit.html
https://blog.quarkslab.com/cve-2020-0069-autopsy-of-the-most-stable-mediatek-rootkit.html
Quarkslab
CVE-2020-0069: Autopsy of the Most Stable MediaTek Rootkit - Quarkslab's blog
In March 2020, Google patched a critical vulnerability affecting many MediaTek based devices. This vulnerability had been known by MediaTek since April 2019, and later exploited in the wild! In this post, we give some details about this vulnerability and…
Android.Circle adware trojan found on Google Play is capable of executing BeanShell noscripts
https://news.drweb.com/show/?i=13740&lng=en
Samples: https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.Circle/README.adoc
https://news.drweb.com/show/?i=13740&lng=en
Samples: https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.Circle/README.adoc
Dr.Web
Android.Circle.1 adware trojan found on Google Play is capable of executing BeanShell noscripts
Analysis of new Android banking Trojan - Eventbot (chinese)
https://ti.qianxin.com/blog/articles/new-bank-trojan-eventbot-affects-234-financial-applications/
https://ti.qianxin.com/blog/articles/new-bank-trojan-eventbot-affects-234-financial-applications/
Qianxin
奇安信威胁情报中心
Nuxt.js project
Zoom iOS App Sends Data to Facebook Even if You Don’t Have a Facebook Account
https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account
https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account
VICE
Zoom iOS App Sends Data to Facebook Even if You Don’t Have a Facebook Account
Zoom's privacy policy isn't explicit about the data transfer to Facebook at all.
Operation Poisoned News
-exploit iOS vulns to install lightSpy malware
-Android dmsSpy
https://blog.trendmicro.com/trendlabs-security-intelligence/operation-poisoned-news-hong-kong-users-targeted-with-mobile-malware-via-local-news-links/
-exploit iOS vulns to install lightSpy malware
-Android dmsSpy
https://blog.trendmicro.com/trendlabs-security-intelligence/operation-poisoned-news-hong-kong-users-targeted-with-mobile-malware-via-local-news-links/
Trend Micro
Research, News, and Perspectives
Security vulnerability discovered in Apple’s iOS version 13.4 that prevents VPNs from encrypting all traffic
https://protonvpn.com/blog/apple-ios-vulnerability-disclosure/
https://protonvpn.com/blog/apple-ios-vulnerability-disclosure/
Proton VPN
VPN bypass vulnerability in Apple iOS
We discovered a security vulnerability in Apple’s iOS that causes connections to remain unencrypted even after connecting to VPN.
Patching a split APK to use Objection
https://nickbloor.co.uk/2020/03/29/patching-android-split-apks/
https://nickbloor.co.uk/2020/03/29/patching-android-split-apks/
NickstaDB
Patching Android Split APKs
I recently came up against my first split APK during an Android app security assessment. My usual toolkit doesn’t support split APKs, so I hacked together a solution to allow me to instrument…
Android 11 system images for QEMU emulator are capable of executing ARM binaries
How? When an app’s process requires an ARM binary, the binary is translated to x86 within that process exclusively
https://android-developers.googleblog.com/2020/03/run-arm-apps-on-android-emulator.html
How? When an app’s process requires an ARM binary, the binary is translated to x86 within that process exclusively
https://android-developers.googleblog.com/2020/03/run-arm-apps-on-android-emulator.html
Android Developers Blog
Run ARM apps on the Android Emulator
Posted by Michael Hazard As part of the Android 11 developer preview we’ve released Android 11 system images , which are capable of ex...