Witold Precikowski

@pr3wtd

Android malware researcher | Founder of

Vrijeme pridruživanja: veljača 2017.

Tweetovi

Blokirali ste korisnika/cu @pr3wtd

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pr3wtd

  1. Prikvačeni tweet
    21. kol 2019.

    I'm thrilled to present - analysis, detection and classification platform! Analyze suspicious apps, detect known threats and extract malware configurations. Go and check features:

    Prikaži ovu nit
    Poništi
  2. 4. velj

    In January I've analyzed 60+ samples that were available on Google Play. Here are short findings: - 28 payload distribution domains - 10 different string obfuscation schemes - 8 types of first-stage payload - detections improved significantly

    Poništi
  3. proslijedio/la je Tweet
    20. sij
    Poništi
  4. proslijedio/la je Tweet
    9. sij

    Check out my new blog on the history of the Bread (Joker) malware family's techniques

    Poništi
  5. 8. sij

    And still some samples reach over 100,000+ downloads on Package: com.fits.incible.gamebox

    Prikaži ovu nit
    Poništi
  6. 8. sij

    still makes it through to Play Store with zero detection on VT. Number of malicious samples is at least worrying. One of them reported at 0+ downloads (currently 100+). Hopefully it will change in the near future.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    3 Malicious apps distributed via Play Store were exploiting a critical rooting flaw (CVE-2019-2215) almost 6 months before it was discovered that Israeli surveillance firm NSO Group used the flaw as zero-day Read:

    Poništi
  8. proslijedio/la je Tweet
    18. pro 2019.

    drop point: hxxp://cewavato.tk SHA256: c6559133aad4284821f98da04a06d84596e2f5c663fcc5a057872ec30201862e C&Cs: hxxps://designpriorityozone.info hxxps://animalaround.info stats:

    Poništi
  9. 14. pro 2019.

    evolves and sneaks into with 0/64 detections on VT. AES-encrypted payload downloaded from: hxxp://caftgame[.]top/sdk Package: com.flame.Pass.through Thx for cooperation!

    Poništi
  10. proslijedio/la je Tweet
    14. pro 2019.

    After 1 year of silence, it looks likethe (alias ) banking is back on the menu! Targeting 9 different banking apps in Brazil.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    4. pro 2019.

    JPCERT/CC released the instruction videos of and MalConfScan with Cuckoo! MalConfScan Summary Demonstration MalConfScan-with-Cuckoo Summary Demonstration

    Poništi
  12. proslijedio/la je Tweet
    1. pro 2019.

    New trojan variant 🚨 Reflection + c2 strings are in file hash : 74f0cf3cbaaedcc5a185c635ff3ff4ad26afe6a44e0aef7b668555ad5016489b I tried 's simplfy but didn't worked out. Malicious class : com.ivy.module.a.a

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    30. stu 2019.

    November: Hiddenad/adware/joker/x samples that found on googleplay by researchers over 4,7 million installs 👀 You can find samples with package name or hash in apklab/koodous

    Poništi
  14. proslijedio/la je Tweet
    25. stu 2019.

    Too Quiet in the Library: A Study of Native Third-Party Libraries in Android [PAPER]

    Poništi
  15. proslijedio/la je Tweet
    25. stu 2019.

    DL-Droid: Deep learning based android malware detection using real devices [PAPER]

    Poništi
  16. proslijedio/la je Tweet
    22. stu 2019.

    11 Trojans with 2,311,051+ installs have been found on Google Play IoCs:

    Poništi
  17. proslijedio/la je Tweet
    21. stu 2019.

    [BLOG] New Ginp banking , a patchwork reusing parts of the infamous Anubis . An initial target list of Spanish , again indicating a focus from financially motivated threat actors on European banks.

    Poništi
  18. proslijedio/la je Tweet

    Genesis, a framework to generate unique obfuscated test cases to test techniques (rather than specific samples) on systems, is now public! More information can be found here: I'd like to thank ABN AMRO for the freedom to develop this idea!

    Prikaži ovu nit
    Poništi
  19. 14. stu 2019.
    Poništi
  20. proslijedio/la je Tweet
    6. stu 2019.

    Pipelining VT Intelligence searches and sandbox report lookups via APIv3 to automatically generate indicators of compromise

    Poništi
  21. proslijedio/la je Tweet
    6. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·