For more than a year, mobile browsers like Google Chrome, Firefox, and Safari failed to show any phishing warnings to users, according to a research paper published this week.
https://www.zdnet.com/article/mobile-chrome-safari-and-firefox-failed-to-show-phishing-warnings-for-more-than-a-year/
https://www.zdnet.com/article/mobile-chrome-safari-and-firefox-failed-to-show-phishing-warnings-for-more-than-a-year/
ZDNet
Mobile Chrome, Safari, and Firefox failed to show phishing warnings for more than a year
Google Safe Browsing didn't show phishing warnings for mobile browsers between mid-2017 and late-2018.
Rather use your charging adapter then USB charging stations.
“Let’s say I’m a bad guy. I go into an airport. I’m not going to easily take apart the charging station but it’s easy to just leave my cord behind. Now, if you see an Apple charging cord, you’re likely to grab it or just plug into it. But inside this cord is an extra chip that deploys the malware, so it charges your phone but now I own your computer.”
https://www.forbes.com/sites/suzannerowankelleher/2019/05/21/why-you-should-never-use-airport-usb-charging-stations/
“Let’s say I’m a bad guy. I go into an airport. I’m not going to easily take apart the charging station but it’s easy to just leave my cord behind. Now, if you see an Apple charging cord, you’re likely to grab it or just plug into it. But inside this cord is an extra chip that deploys the malware, so it charges your phone but now I own your computer.”
https://www.forbes.com/sites/suzannerowankelleher/2019/05/21/why-you-should-never-use-airport-usb-charging-stations/
Forbes
Why You Should Never Use Airport USB Charging Stations
Stop! Plugging into that airport USB charging station could put your personal data at risk.
The DuckDuckGo Privacy Browser application 5.26.0 for Android allows address bar spoofing via a setInterval call
https://www.inputzero.io/2019/05/duckduckgo-address-bar-spoofing.html
https://www.inputzero.io/2019/05/duckduckgo-address-bar-spoofing.html
www.inputzero.io
DuckDuckGo Address Bar Spoofing
DuckDuckGo Address Bar Spoofing | CVE-2019-12329
How to start with reverse engineering of ARM http://www.giovanni-rocca.com/i-want-to-be-an-arm-reverse-engineer/
Fake Antivirus app found on Google Play
https://blog.trustlook.com/security-app-rreview-lionmobi/
https://blog.trustlook.com/security-app-rreview-lionmobi/
Trustlook blog
Security APP Review - Lionmobi
An Anti-Virus mobile App can have fancy UI and claimed to have a lot of protections to your phone. However, non-tech users wouldn't know whether it is true or not. Let's have some reviews on some popular mobile security Apps.
Top Android malware threats - May 2019 http://skptr.me/malware_timeline_2019.html
Lookout has discovered 238 unique applications that include BeiTaPlugin adware with over 440 million installations on Google Play
https://blog.lookout.com/beitaplugin-adware
https://blog.lookout.com/beitaplugin-adware
Lookout
Adware "BeiTaAd" Found Hidden in Popular Applications | Threat Intel
BeiTaAd is a well-obfuscated advertising plug-in hidden within a number of popular applications in Google Play. Discover more about this mobile threat.
The idea of the new system is to turn Apple’s existing network of iPhones into a massive crowdsourced location tracking system. Every active iPhone will continuously monitor for BLE beacon messages that might be coming from a lost device. When it picks up one of these signals, the participating phone tags the data with its own current GPS location; then it sends the whole package up to Apple’s servers.
https://blog.cryptographyengineering.com/2019/06/05/how-does-apple-privately-find-your-offline-devices/amp/
https://blog.cryptographyengineering.com/2019/06/05/how-does-apple-privately-find-your-offline-devices/amp/
A Few Thoughts on Cryptographic Engineering
How does Apple (privately) find your offline devices?
At Monday’s WWDC conference, Apple announced a cool new feature called “Find My”. Unlike Apple’s “Find my iPhone”, which uses cellular communication and the lost…
Don't install these apps, they are still available on Google Play. These apps display unwanted after user unlocks device and hide from home menu.
These apps mostly impersonate Camera/Photo editor applications.
Source: https://twitter.com/LukasStefanko/status/1136568939239137280?s=19
These apps mostly impersonate Camera/Photo editor applications.
Source: https://twitter.com/LukasStefanko/status/1136568939239137280?s=19
Talk about 10 different Android malware families discovered on Google Play + analysis on Anubis Banking Trojan
https://youtu.be/4oSuv-kXWJI
https://youtu.be/4oSuv-kXWJI
YouTube
CONFidence 2019: "Latest Android threats and their techniques" - Lukas Štefanko
The number of Android devices, developers and applications is growing, making our lives even more convenient and connected. But there is also a dark side to the number of apps: malicious actors developing apps capable of stealing mobile banking credentials…
PHONES INFECTED WITH BACKDOOR TROJAN
Impacted models include the Doogee BL7000, the M-Horse Pure 1, the Keecoo P11, and the VKworld Mix Plus.
https://www.zdnet.com/article/germany-backdoor-found-in-four-smartphone-models-20000-users-infected/
Impacted models include the Doogee BL7000, the M-Horse Pure 1, the Keecoo P11, and the VKworld Mix Plus.
https://www.zdnet.com/article/germany-backdoor-found-in-four-smartphone-models-20000-users-infected/
ZDNet
Germany: Backdoor found in four smartphone models; 20,000 users infected
German cyber-security agency warns against buying or using four low-end smartphone models.
Preinstalled backdoor - Triada - found in Android devices.
Triada infects device system images through a third-party during the production process. Sometimes OEMs want to include features that aren’t part of the Android Open Source Project, such as face unlock. The OEM might partner with a third-party that can develop the desired feature and send the whole system image to that vendor for development.
https://security.googleblog.com/2019/06/pha-family-highlights-triada.html
Triada infects device system images through a third-party during the production process. Sometimes OEMs want to include features that aren’t part of the Android Open Source Project, such as face unlock. The OEM might partner with a third-party that can develop the desired feature and send the whole system image to that vendor for development.
https://security.googleblog.com/2019/06/pha-family-highlights-triada.html
Google Online Security Blog
PHA Family Highlights: Triada
Posted by Lukasz Siewierski, Android Security & Privacy Team We continue our PHA family highlights series with the Triada family, whi...
“Digging Android Applications — Part 1 — Drozer + Burp” by Yasho https://link.medium.com/gVswDFdKlX
Medium
Digging into Android Applications — Part 1 — Drozer + Burp
Hello, in this post I’m going to solve the first section of Andrill:
Anubis Android Bank Trojan technical analysis and recent activities summary (Chinese)
https://ti.qianxin.com/blog/articles/anubis-android-bank-trojan-technical-analysis-and-recent-activities-summary/
https://ti.qianxin.com/blog/articles/anubis-android-bank-trojan-technical-analysis-and-recent-activities-summary/
Qianxin
奇安信威胁情报中心
Nuxt.js project
Many unofficial Telegram apps could be remotely controlled
https://link.medium.com/FfLwZsvrnX
https://link.medium.com/FfLwZsvrnX
Medium
Unofficial telegrams and privacy in iran
For more than a few years, Telegram is the main and most popular messenger among Iranians, After many events, the Iranian government…
Mobile phishing toolkit remotely controlled by an app
https://github.com/UndeadSec/SocialFishMobile
https://github.com/UndeadSec/SocialFishMobile
GitHub
GitHub - UndeadSec/SocialFishMobile: :iphone: An app to remote control SocialFish.
:iphone: :fish: An app to remote control SocialFish. - GitHub - UndeadSec/SocialFishMobile: :iphone: An app to remote control SocialFish.
🥰1
Anubis downloader found on Google Play with 1,000+ installs.
Info: https://twitter.com/0xabc0/status/1137988063244763136?s=19 via @0xabc0
Info: https://twitter.com/0xabc0/status/1137988063244763136?s=19 via @0xabc0
Overview of 4 techniques used by Android malware to detect name of launched app.
+ how developers can protect their apps against one of these technique.
https://eybisi.run/Mobile-Malware-Analysis-Overlay-and-How-to-Counter-it/
+ how developers can protect their apps against one of these technique.
https://eybisi.run/Mobile-Malware-Analysis-Overlay-and-How-to-Counter-it/
hedgehog's cave
Mobile Malware Analysis : Overlay and How to Counter It (Partly)
Defeating OverlayIn my last anubis post I touched on overlay and how malware use process scanning to get top process. If somehow we can bypass those techniques, in a way overlay can be defeated. In th