Android malware in DoNot APT operations
https://www.cyfirma.com/research/android-malware-in-donot-apt-operations/
https://www.cyfirma.com/research/android-malware-in-donot-apt-operations/
CYFIRMA
ANDROID MALWARE IN DONOT APT OPERATIONS - CYFIRMA
EXECUTIVE SUMMARY The research team at CYFIRMA collected a sample attributed to the Indian APT group known as โDONOTโ, which...
โค12๐6๐ค2๐1
USB Army Knife: Close Access Penetest Tool
It is capable of: remote keystroke injection, VNC, USB network adapter, EvilAP, Marauder, record microphone, controlled over web interface with fancy LCD screen
https://www.mobile-hacker.com/2025/01/24/usb-army-knife-the-ultimate-close-access-penetest-tool/
It is capable of: remote keystroke injection, VNC, USB network adapter, EvilAP, Marauder, record microphone, controlled over web interface with fancy LCD screen
https://www.mobile-hacker.com/2025/01/24/usb-army-knife-the-ultimate-close-access-penetest-tool/
Mobile Hacker
USB Army Knife: The Ultimate Close Access Penetest Tool
Whether you want to transform into a USB Ethernet adapter and capture network traffic, create custom user interface for your attacks, or use covert storage devices, the USB Army Knife has you covered.
๐29๐ฅ3๐2
Vulnerability of hotel room Android kiosk tablets
It was possible to execute ADB commands, unlock bootloader and possibly escalate privileges to root. Pull kiosk apps for reverse engineering and obtain servers (pivot) or hardcoded secrets.
As a result attacker could pose as another guest room terminal and control the air conditioning and lights, place orders, display bills, and eavesdrop on chats
https://devblog.lac.co.jp/entry/20250124
It was possible to execute ADB commands, unlock bootloader and possibly escalate privileges to root. Pull kiosk apps for reverse engineering and obtain servers (pivot) or hardcoded secrets.
As a result attacker could pose as another guest room terminal and control the air conditioning and lights, place orders, display bills, and eavesdrop on chats
https://devblog.lac.co.jp/entry/20250124
ใฉใใฏใปใปใญใฅใชใใฃใใฃใ็
ฎใใญใฐ
้ซ็ดใใใซใฎๅฎขๅฎคใฟใใฌใใใซๆฝใๅฑ้บ๏ผไปๅฎขๅฎคใๆไฝใ็่ดๅฏ่ฝใ ใฃใ่ๅผฑๆงใ็บ่ฆใใใพใง - ใฉใใฏใปใปใญใฅใชใใฃใใฃใ็
ฎใใญใฐ
ใใ
ใผใจใงใใ ๆฐๅฉๆ
่กใงๆฒ็ธใซ่กใฃใฆใใใฎใงใใใใใใงๆณใพใฃใ้ซ็ดใชใพใผใใใใซใฎๅฎขๅฎคใซใฟใใฌใใใ็ฝฎใใฆใใใพใใใ ใใฎใฟใใฌใใใ่ชฟๆปใใใจใใใๅฎขๅฎคๅ
ใฎ็่ดใป็ๆฎใๅฏ่ฝใจใชใ่ๅผฑๆงใใ็ฌฌไธ่
ใใใใใฏใผใฏไธใใไปๅฎขๅฎคใฎใณใณใใญใผใซใใใฃใใใฎ็่ดใๅฏ่ฝใจใชใ่ๅผฑๆงใ็บ่ฆใใพใใใใใฎๅ้กใฏIPAใ้ใใฆ้็บโฆ
๐11๐ฅ5๐2๐2
Analysis of TrickMo Android malware campaign targeting Poland
https://www.sirt.pl/atak-na-uzytkownikow-androida-falszywa-aplikacja-olx/
https://www.sirt.pl/atak-na-uzytkownikow-androida-falszywa-aplikacja-olx/
PREBYTES Security Incident Response Team
Atak na uลผytkownikรณw Androida - Faลszywa aplikacja OLX
W ostatnich tygodniach uลผytkownicy OLX padli ofiarฤ
nowej zลoลliwej aplikacji, ktรณra podszywa siฤ pod popularnฤ
platformฤ ogลoszeniowฤ
. Atak malware wykorzystuje metodฤ phishingu, majฤ
c na celu kradzieลผ danych osobowych i ลrodkรณw finansowych. Jak dziaลa taโฆ
โค8๐2๐ฅ2๐2๐1
Android Tria stealer: malware that exfiltrates data and hijack accounts
https://securelist.com/tria-stealer-collects-sms-data-from-android-devices/115295/
https://securelist.com/tria-stealer-collects-sms-data-from-android-devices/115295/
Securelist
Tria stealer targets Android users for SMS exfiltration and financial gain
Kaspersky GReAT experts discovered a new campaign targeting Android devices in Malaysia and Brunei with the Tria stealer to collect data from apps like WhatsApp and Gmail.
๐8๐3๐ฅ2โค1๐1
Understanding WiFi Karma attacks or how and why devices can auto-reconnect to untrusted networks
https://www.mobile-hacker.com/2025/02/05/hacking-on-the-go-wi-fi-karma-attacks-with-mobile-devices/
https://www.mobile-hacker.com/2025/02/05/hacking-on-the-go-wi-fi-karma-attacks-with-mobile-devices/
Mobile Hacker
Hacking on the Go: Wi-Fi Karma Attacks with Mobile Devices
Being automatically reconnected to known Wi-Fi networks is a convenience that comes with security risks, one of them being the Wi-Fi Karma Attack. Cybercriminals can use this method to trick unsuspecting users into automatically connecting to rogue Wi-Fiโฆ
๐16๐ฑ3โค2๐2๐ฟ2
SparkCat malware: OCR crypto stealers in Google Play and App Store
https://securelist.com/sparkcat-stealer-in-app-store-and-google-play/115385/
https://securelist.com/sparkcat-stealer-in-app-store-and-google-play/115385/
Securelist
SparkCat crypto stealer in Google Play and App Store
Kaspersky experts discover iOS and Android apps infected with the SparkCat crypto stealer in Google Play and the App Store. It steals crypto wallet data using an OCR model.
๐ฅ13๐6๐1
Mobile Indian Cyber Heist: FatBoyPanel And His Massive Data Breach
https://www.zimperium.com/blog/mobile-indian-cyber-heist-fatboypanel-and-his-massive-data-breach/
https://www.zimperium.com/blog/mobile-indian-cyber-heist-fatboypanel-and-his-massive-data-breach/
Zimperium
Mobile Indian Cyber Heist: FatBoyPanel And His Massive Data Breach
true
๐6๐2๐ฅฑ2๐ด1
Frida script to bypass root detection & SSL certificate pinning
https://github.com/0xCD4/SSL-bypass
https://github.com/0xCD4/SSL-bypass
GitHub
GitHub - 0xCD4/SSL-bypass: SSL bypass check
SSL bypass check. Contribute to 0xCD4/SSL-bypass development by creating an account on GitHub.
๐9โค2๐2
Unpacking the BADBOX Botnet with Censys
https://censys.com/unpacking-the-badbox-botnet/
https://censys.com/unpacking-the-badbox-botnet/
๐8๐ฅ2๐2
Exploiting the iOS Kernel by Spraying IOSurfaces
https://youtu.be/Y-UI4dEFXFk?si=6UpFUyABAX7htCWn
https://youtu.be/Y-UI4dEFXFk?si=6UpFUyABAX7htCWn
YouTube
But How Does a Kernel Exploit Actually Work?
Are you a security researcher or reverse engineer?
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individualsโฆ
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individualsโฆ
๐10โค4๐3
Evil Crow RF: A Portable Radio Frequency Device compatible with Flipper Zero Sub-GHz file format
https://www.mobile-hacker.com/2025/02/11/evil-crow-rf-a-portable-radio-frequency-device/
https://www.mobile-hacker.com/2025/02/11/evil-crow-rf-a-portable-radio-frequency-device/
Mobile Hacker
Evil Crow RF: A Portable Radio Frequency Device
This tool expands your smartphoneโs capabilities, allowing you to dive into RF analysis, penetration testing, and signal manipulationโbringing mobile hacking to a whole new level.
๐15๐ฅ5๐ฅฐ3โก2๐2๐ค1
BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites
https://cyble.com/blog/btmob-rat-newly-discovered-android-malware/
https://cyble.com/blog/btmob-rat-newly-discovered-android-malware/
Cyble
BTMOB RAT Newly Discovered Android Malware
Cyble analyzes BTMOB RAT, advanced Android malware actively spreading via phishing sites, leveraging Accessibility Services to steal credentials, control devices remotely, and execute various malicious activities.
๐12๐5โค2๐2
Network Security Issues in RedNote app
https://citizenlab.ca/2025/02/network-security-issues-in-rednote/
https://citizenlab.ca/2025/02/network-security-issues-in-rednote/
The Citizen Lab
Network Security Issues in RedNote
Our first network security analysis of the popular Chinese social media platform, RedNote, revealed numerous issues with the Android and iOS versions of the app. Most notably, we found that both the Android and iOS versions of RedNote fetch viewed imagesโฆ
๐8๐ฅ4๐2โก1
Using capa Rules for Android Malware Detection
https://cloud.google.com/blog/topics/threat-intelligence/capa-rules-android-malware-detection/
https://cloud.google.com/blog/topics/threat-intelligence/capa-rules-android-malware-detection/
Google Cloud Blog
Using capa Rules for Android Malware Detection | Google Cloud Blog
Android and Mandiant have improved the existing and developed new capa rules to detect capabilities observed in Android malware.
๐8๐ค4โค2๐2
First analysis of Apple's USB Restricted Mode bypass (CVE-2025-24200)
https://blog.quarkslab.com/first-analysis-of-apples-usb-restricted-mode-bypass-cve-2025-24200.html
https://blog.quarkslab.com/first-analysis-of-apples-usb-restricted-mode-bypass-cve-2025-24200.html
Quarkslab
First analysis of Apple's USB Restricted Mode bypass (CVE-2025-24200) - Quarkslab's blog
Apple released iOS 18.3.1 (build 22D72) to patch a vulnerability tied to the Accessibility framework and reported by Citizen Lab. Let's analyze it!
๐11โค3๐ฅ2๐2
Introduction to Fuzzing Android Native Components: Strategies for Harness Creation
https://blog.convisoappsec.com/en/introduction-to-fuzzing-android-native-components-strategies-for-harness-creation/
https://blog.convisoappsec.com/en/introduction-to-fuzzing-android-native-components-strategies-for-harness-creation/
Conviso AppSec
Introduction to Fuzzing Android Native Components: Strategies for Harness Creation
Learn how to build effective harnesses for fuzzing native libraries on Android. Explore techniques and strategies to uncover vulnerabilities
๐5๐ฅ3โค2๐1
Qardio Heart Health IOS and Android Application and QardioARM A100
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-044-01
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-044-01
๐3
Bettercap on Android
60-pages guide on how to use bettercap on mobile device
https://www.mobile-hacker.com/2025/02/21/bettercap-on-android-a-portable-network-security-toolkit/
60-pages guide on how to use bettercap on mobile device
https://www.mobile-hacker.com/2025/02/21/bettercap-on-android-a-portable-network-security-toolkit/
Mobile Hacker
Bettercap on Android: A Portable Network Security Toolkit
This setup is not only lightweight and portable but also ensures that a pentester can operate in plain sight, appearing as just another person on their phone. In this guide, we'll show you how to install, configure, and use bettercap on Android, unlockingโฆ
๐20๐6๐3๐ฅ2
SpyLend Android malware downloaded 100,000 times from Google Play
https://www.cyfirma.com/research/spylend-the-android-app-available-on-google-play-store-enabling-financial-cyber-crime-extortion/
https://www.cyfirma.com/research/spylend-the-android-app-available-on-google-play-store-enabling-financial-cyber-crime-extortion/
CYFIRMA
SPYLEND: The Android App Available on Google Play Store: Enabling Financial Cyber Crime & Extortion - CYFIRMA
EXECUTIVE SUMMARY At CYFIRMA, we are dedicated to providing current insights into prevalent threats and strategies employed by malicious entities...
๐ฑ10๐3๐1๐ป1
Android trojan TgToxic updates its capabilities
https://intel471.com/blog/android-trojan-tgtoxic-updates-its-capabilities
https://intel471.com/blog/android-trojan-tgtoxic-updates-its-capabilities
๐8๐4๐ฅ3โค1