GPT Trade: Fake Google Play Store drops BTMob Spyware and UASecurity Miner on Android Devices
https://www.d3lab.net/gpt-trade-fake-google-play-store-drops-btmob-spyware-and-uasecurity-miner-on-android-devices/
https://www.d3lab.net/gpt-trade-fake-google-play-store-drops-btmob-spyware-and-uasecurity-miner-on-android-devices/
D3Lab
GPT Trade: Fake Google Play Store drops BTMob Spyware and UASecurity Miner on Android Devices
A recently discovered Android campaign leverages a fake Google Play Store to distribute GPT Trade, a malicious dropper posing as a ChatGPT-themed trading app. Once installed, the dropper silently generates and deploys two additional malware familiesโBTMobโฆ
โค15๐5๐ฉ2๐ฅด1๐1
One of top-selling digital picture frames from Amazonโs between March and April 2025 comes:
-rooted by default
-runs Android 6
-SELinux security module disabled
-downloads and executes malicious payloads from China-based servers at boot
-17 security issues discovered
report: https://go.quokka.io/hubfs/App-Intel/Technical_Uhale-Digital-Picture-Frame-Security-Assessment.pdf
-rooted by default
-runs Android 6
-SELinux security module disabled
-downloads and executes malicious payloads from China-based servers at boot
-17 security issues discovered
report: https://go.quokka.io/hubfs/App-Intel/Technical_Uhale-Digital-Picture-Frame-Security-Assessment.pdf
๐22๐9๐คฏ5๐2
A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
https://github.com/sbaresearch/whatsapp-census
https://github.com/sbaresearch/whatsapp-census
๐คฏ19๐ฅ10๐ฅฑ4๐3
Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption
https://www.threatfabric.com/blogs/sturnus-banking-trojan-bypassing-whatsapp-telegram-and-signal
https://www.threatfabric.com/blogs/sturnus-banking-trojan-bypassing-whatsapp-telegram-and-signal
ThreatFabric
Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption
Sturnus is a privately operated Android banking trojan with many fraud-related capabilities, including Device Takeover and capturing decrypted messages.
๐11๐8๐ฅฑ2
The Phia app for iOS injects JavaScript and still collects almost every URL you visit with their Safari extension. Safari extensions even with Appleโs restrictions
https://gist.github.com/dweinstein/4d827f787ba65b5d0fd05cc9814883c4
https://gist.github.com/dweinstein/4d827f787ba65b5d0fd05cc9814883c4
Gist
phia ios app analysis (living document)
phia ios app analysis (living document). GitHub Gist: instantly share code, notes, and snippets.
๐11๐คฏ2๐คฃ1
WhatsApp by the Numbers
I dived into anonymized metadata published after a #WhatsApp security issue that exposed 3.5B phone numbers
-Android rules (81%)
-iOS dominates in rich markets
-Monaco = multi-account heaven
-China is niche but enterprise-heavy
https://www.mobile-hacker.com/2025/11/20/whatsapp-by-the-numbers-what-anonymized-metadata-from-a-security-flaw-reveals/
I dived into anonymized metadata published after a #WhatsApp security issue that exposed 3.5B phone numbers
-Android rules (81%)
-iOS dominates in rich markets
-Monaco = multi-account heaven
-China is niche but enterprise-heavy
https://www.mobile-hacker.com/2025/11/20/whatsapp-by-the-numbers-what-anonymized-metadata-from-a-security-flaw-reveals/
Mobile Hacker
WhatsApp by the Numbers: What Anonymized Metadata from a Security Flaw Reveals
The dataset originates from metadata published in connection with a security study titled โTrivial WhatsApp Security Issue Exposed 3.5 Billion Phone Numbers.โ That research demonstrated how a simple flaw could reveal phone numbers globally.
โค13๐6๐ฅ3๐คฎ3
How deep links in mobile apps can be exploited for Remote Code Execution (RCE)
https://medium.com/meetcyber/exploiting-deep-links-for-rce-in-mobile-applications-6806c330c00b
https://medium.com/meetcyber/exploiting-deep-links-for-rce-in-mobile-applications-6806c330c00b
Medium
Exploiting Deep Links for RCE in Mobile Applications
In this blog, we will see how we can exploit a deeplink to achieve an RCE
โค13๐4๐2
Proof-of-concept exploit showing how itunesstored & bookassetd daemons can be abused to escape iOS sandbox restrictions
https://hanakim3945.github.io/posts/download28_sbx_escape/
https://hanakim3945.github.io/posts/download28_sbx_escape/
Hana's Blog
itunesstored & bookassetd sbx escape - Hana's Blog
POC writeup to exploit sandbox escape in itunesstored & bookassetd
๐8๐4
GhostAd: Hidden Google Play Adware Drains Devices and Disrupts Millions of Users
https://blog.checkpoint.com/research/ghostad-hidden-google-play-adware-drains-devices-and-disrupts-millions-of-users/
https://blog.checkpoint.com/research/ghostad-hidden-google-play-adware-drains-devices-and-disrupts-millions-of-users/
Check Point Blog
GhostAd: Hidden Google Play Adware Drains Devices and Disrupts Millions of Users - Check Point Blog
Check Point researchers uncover a large-scale Android adware campaign that silently drains resources and disrupts normal phone use through persistent
๐5๐2
RadzaRat: New Android Trojan Disguised as File Manager Emerges with Zero Detection Rate
https://www.certosoftware.com/insights/radzarat-new-android-trojan-disguised-as-file-manager-emerges-with-zero-detection-rate/
https://www.certosoftware.com/insights/radzarat-new-android-trojan-disguised-as-file-manager-emerges-with-zero-detection-rate/
Certo Software | iPhone & Android Spyware Detection
RadzaRat: New Android Trojan Disguised as File Manager Emerges with Zero Detection Rate
The Android malware-as-a-service (MaaS) ecosystem continues to evolve with increasingly sophisticated threats designed to evade security measures while maintaining operational simplicity for would-be attackers.
๐14๐จโ๐ป6โค5
Is Your Android TV Streaming Box Part of a Botnet?
https://krebsonsecurity.com/2025/11/is-your-android-tv-streaming-box-part-of-a-botnet/
https://krebsonsecurity.com/2025/11/is-your-android-tv-streaming-box-part-of-a-botnet/
Krebs on Security
Is Your Android TV Streaming Box Part of a Botnet?
On the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all forโฆ
โค10โก4๐3
Turn Your Old Android Into a Privacy Box!
Pi-hole blocks ads, trackers and shady websites across your entire network - and you can run it on that old Android phone sitting in your drawer!
https://www.mobile-hacker.com/2025/11/25/pi%e2%80%91hole-on-android-turn-your-spare-smartphone-into-a-network%e2%80%91wide-ad%e2%80%91blocker/
Pi-hole blocks ads, trackers and shady websites across your entire network - and you can run it on that old Android phone sitting in your drawer!
https://www.mobile-hacker.com/2025/11/25/pi%e2%80%91hole-on-android-turn-your-spare-smartphone-into-a-network%e2%80%91wide-ad%e2%80%91blocker/
Mobile Hacker
Piโhole on Android: Turn Your Spare Smartphone into a NetworkโWide AdโBlocker
Piโhole is a networkโlevel ad and tracker blocker. Instead of installing adโblockers on each device, Piโhole runs as your DNS server, intercepting domain lookups and returning a null/blocked response for domains on curated blocklists.
โค22๐9๐ฅ7
RelayNFC: The New NFC Relay Malware Targeting Brazil
https://cyble.com/blog/relaynfc-nfc-relay-malware-targeting-brazil/
https://cyble.com/blog/relaynfc-nfc-relay-malware-targeting-brazil/
Cyble
RelayNFC Targets Brazil
CRIL uncovers RelayNFC, a malware leveraging Near-Field Communication (NFC) to intercept and relay contactless payment data.
๐6๐4โค3
Arbitrary App Installation on Intune Managed Android Enterprise BYOD
https://jgnr.ch/sites/android_enterprise.html
https://jgnr.ch/sites/android_enterprise.html
๐5๐2
Bypassing iOS Frida Detection with LLDB and Frida
https://tonygo.tech/blog/2025/8ksec-ios-ctf-writeup
https://tonygo.tech/blog/2025/8ksec-ios-ctf-writeup
tonygo.tech
Bypassing iOS Frida Detection with LLDB and Frida | Tony Gorez's Blog
A complete walkthrough of the 8ksec "FridaInTheMiddle" challenge: bypassing Frida detection, hooking Swift functions, and intercepting arguments on a jailbroken iPhone.
๐12
Hunting potential C2 commands in Android malware via Smali string comparison and control flow
https://youtu.be/BVMEHN_D-Gg
https://youtu.be/BVMEHN_D-Gg
YouTube
Hunting potential C2 commands in Android malware via Smali string comparison and control flow
Hunting potential C2 commands in Android malware via Smali string comparison and control flow
Presented at the VB2025 conference in Berlin, 24 - 26 September 2025.
โ Slides: https://www.virusbulletin.com/uploads/pdf/conference/vb2025/slides/Slides-Huntingโฆ
Presented at the VB2025 conference in Berlin, 24 - 26 September 2025.
โ Slides: https://www.virusbulletin.com/uploads/pdf/conference/vb2025/slides/Slides-Huntingโฆ
๐4๐2
[beginners] Android Recon for Bug Bounty
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
YesWeHack
Android recon for Bug Bounty hunters: A complete guide
An in-depth Bug Bounty guide to performing reconnaissance on Android apps โ from extracting APKs to mapping endpoints, secrets and vulnerable components.
๐5๐3โค2
SSL Pinning Bypass โ Android
https://hardsoftsecurity.es/index.php/2025/11/26/ssl-pinning-bypass-android/
https://hardsoftsecurity.es/index.php/2025/11/26/ssl-pinning-bypass-android/
Hardsoft Security
SSL Pinning Bypass - Android - Hardsoft Security
Here we go again! Today we will be talking about SSL Pinning Bypass in Android. Due the recent cybersecurity congress that I have assisted...
๐7
Combatting Cybercrime against Mobile Devices
This paper examines cybercrime against consumer mobile devices and their users in the UK
https://www.rusi.org/explore-our-research/publications/insights-papers/combatting-cybercrime-against-mobile-devices
This paper examines cybercrime against consumer mobile devices and their users in the UK
https://www.rusi.org/explore-our-research/publications/insights-papers/combatting-cybercrime-against-mobile-devices
www.rusi.org
Combatting Cybercrime against Mobile Devices
Joseph Jarnecki outlines the highest priority cyberthreats against consumer mobile devices and considers potential strategies to mitigate and address the threat.
๐3๐คฃ1
Albiriox Exposed: A New RAT Mobile Malware Targeting Global Finance and Crypto Wallets
https://www.cleafy.com/cleafy-labs/albiriox-rat-mobile-malware-targeting-global-finance-and-crypto-wallets
https://www.cleafy.com/cleafy-labs/albiriox-rat-mobile-malware-targeting-global-finance-and-crypto-wallets
Cleafy
Albiriox Exposed: A New RAT Mobile Malware Targeting Global Finance and Crypto Wallets | Cleafy Labs
Albiriox is a newly identified Android malware family offered as a Malware-as-a-Service, and enabling TAs to perform On-Device Fraud through remote control, screen manipulation, and real-time interaction with the infected device. Read more in this report.
๐2