Get Mystery Box with random crypto!

Android Security & Malware

Logo of telegram channel androidmalware — Android Security & Malware A
Logo of telegram channel androidmalware — Android Security & Malware
Channel address: @androidmalware
Categories: Technologies
Language: English
Subscribers: 38.28K
Description from channel

Mobile cybersecurity channel
Links: https://linktr.ee/mobilehacker
Contact: mobilehackerofficial@gmail.com

Ratings & Reviews

3.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

2

3 stars

1

2 stars

0

1 stars

0


The latest Messages 5

2022-04-07 11:35:19 Measurement SDK library (coelib.c.couluslibrary) implemented in various Android apps is responsible for collecting sensitive data such as Clipboard, GPS, Email, Phone Numbers, IMEI, SSID...
https://blog.appcensus.io/2022/04/06/the-curious-case-of-coulus-coelib/
3.9K views08:35
Open / Comment
2022-04-06 16:46:17 Fake e‑shops on the prowl for banking credentials using Android malware
https://www.welivesecurity.com/2022/04/06/fake-eshops-prowl-banking-credentials-android-malware/
4.2K views13:46
Open / Comment
2022-04-04 09:14:41 Complete dissection of an APK with a suspicious C2 Server
https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server/
5.2K views06:14
Open / Comment
2022-04-01 10:36:30 Update your iPhone
Apple patched two vulnerabilities have been exploited in the wild
CVE-2022-22675, the issue has been described as an out-of-bounds write vulnerability in an audio and video decoding component called AppleAVD that could allow an application to execute arbitrary code with kernel privileges
https://support.apple.com/en-us/HT213219
6.6K views07:36
Open / Comment
2022-03-31 22:24:38 Analysis of 0-click iMessage exploit named FORCEDENTRY
Exploitation: By sending a .gif iMessage attachment (which was really a PDF) NSO were able to remotely trigger a heap buffer overflow in the ImageIO JBIG2 decoder
https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html
6.4K views19:24
Open / Comment
2022-03-31 14:13:37 Here is a demo how a user can download malware on iPhone outside of App Store using configuration profile


5.7K views11:13
Open / Comment
2022-03-31 11:43:39 New APT group APT-Q-43 (#VajraEleph) discovered targeting Pakistani military personnel via targeted SMS or WhatsApp messages using Android RAT #VajraSpy impersonates chat apps
https://mp.weixin.qq.com/s/B0ElRhbqLzs-wGQh79fTww
5.2K views08:43
Open / Comment
2022-03-30 16:22:44 A short history of telephone hacking: from phreaking to mobile malware
https://bit-sentinel.com/a-short-history-of-telephone-hacking-from-phreaking-to-mobile-malware
5.0K views13:22
Open / Comment
2022-03-29 22:22:49 Remote Code Execution in Evernote for Android by misusing path traversal vulnerability
https://hackerone.com/reports/1377748
5.2K views19:22
Open / Comment
2022-03-02 16:26:56 SMS PVA: Underground Service for Cybercriminals
Part 1: https://www.trendmicro.com/en_us/research/22/b/sms-pva-cybercriminals-part-1.html
Part 2: https://www.trendmicro.com/en_us/research/22/b/sms-pva-cybercriminals-part-2.html
234 views13:26
Open / Comment