I.Zhilyakov

173 posts

I.Zhilyakov banner
I.Zhilyakov

I.Zhilyakov

@m0br3v

Mobile malware researcher at @Doctor_Web

Katılım Kasım 2012
140 Takip Edilen1.4K Takipçiler
I.Zhilyakov
I.Zhilyakov@m0br3v·
Phantom: new Android clicker malware family distributed via popular modded apps and Xiaomi’s GetApps games. It performs click fraud using hidden WebView automation, TensorFlowJS-based ad recognition, and WebRTC screen streaming with remote control. news.drweb.com/show/?i=15110&…
I.Zhilyakov tweet mediaI.Zhilyakov tweet media
English
2
3
7
544
I.Zhilyakov
I.Zhilyakov@m0br3v·
Baohuo Android backdoor hijacks Telegram accounts. Malicious versions of Telegram X are distributed via APKPure and other and are posted as if they were from the official messenger developer. It uses Redis as its C2 and has infected over 58,000 devices news.drweb.com/show/?lng=en&i…
I.Zhilyakov tweet mediaI.Zhilyakov tweet mediaI.Zhilyakov tweet media
English
0
1
4
1.6K
I.Zhilyakov
I.Zhilyakov@m0br3v·
Android #GravityRat af3a57a9fc9faf73a1dcad3aa95d67427daa48cbf0917a26d8cd72cae72921fe Distribution: voipchat[.]in C2: an-east.androidannotations[.]com eu-west.androidannotations[.]com cn-west.androidannotations[.]com virustotal.com/gui/file/af3a5…
I.Zhilyakov tweet media
English
0
0
5
5K
I.Zhilyakov
I.Zhilyakov@m0br3v·
Android spyware trojan targets Russian military personnel who use AlpineQuest. It steals contacts, device geolocation, file information, and loads modules. news.drweb.com/show/?lng=en&i…
I.Zhilyakov tweet media
English
0
2
8
2.1K
Steven Chen
Steven Chen@Steven_Chen0616·
@m0br3v Hi @m0br3v this is spyware app MD5: 6f4655824fab7c9abbc048b67c812436 pele28mf .store/dlapk3/1744208078/1742478271.apk
Steven Chen tweet mediaSteven Chen tweet media
English
1
0
1
69
I.Zhilyakov
I.Zhilyakov@m0br3v·
Shibai: a trojanized WhatsApp variant preinstalled in firmware on some cheap Android phones. Modified via LSPatch, it swaps crypto addresses in messages and hijacks update URLs to maintain control news.drweb.com/show/?lng=en&i…
I.Zhilyakov tweet media
English
6
1
5
3.2K
I.Zhilyakov retweetledi
Xlab
Xlab@Xlab_qax·
Our latest blog dives into a new variant of #Vo1d #botnet. C2 sinkhole data reveals it has infected 1.6M Android TVs across 200+ countries. Now leveraging RSA , its network can remains secure even if researchers register DGA C2s blog.xlab.qianxin.com/long-live-the-…
English
1
18
31
10.3K
I.Zhilyakov
I.Zhilyakov@m0br3v·
Android.Vo1d infected nearly 1.3 million TV boxes It is a backdoor that puts its components in the system storage area and, when commanded by attackers, is capable of secretly downloading and installing third-party software. news.drweb.com/show/?i=14900&…
I.Zhilyakov tweet media
English
1
2
7
3.8K
I.Zhilyakov retweetledi
Xlab
Xlab@Xlab_qax·
Our new blog details how the Bigpanzi botnet exploits Android OS TVs and set-top boxes, turning them into a network for illegal activities. This 8 years' operation notably includes setting up a Content Delivery Network (CDN) using infected devices, blog.xlab.qianxin.com/bigpanzi-expos…
English
0
14
31
40.3K
Anti-Malware.Ru
Anti-Malware.Ru@Anti_Malware·
Действие сертификата антивируса компании «Доктор Веб», выданного ФСТЭК России, в настоящее время приостановлено. Согласно реестру регулятора, изменения вступили в силу 8 сентября 2023 года. anti-malware.ru/news/2023-09-2…
Русский
1
0
0
155
I.Zhilyakov
I.Zhilyakov@m0br3v·
Android.Pandora trojans compromise Android TV boxes during firmware updates or when applications for viewing pirated video content are installed. This backdoor inherited its advanced DDoS-attack capabilities from the Linux.Mirai trojan. news.drweb.com/show/?i=14743&…
I.Zhilyakov tweet media
English
2
16
30
10.6K
I.Zhilyakov
I.Zhilyakov@m0br3v·
This SDK expands the capabilities of JavaScript code executed on loaded webpages containing ads. It adds many features to such code, including the ability to: - obtain a list of files in the directories, - obtain a file from the device, - read/write the clipboard contents etc.
English
0
0
2
7.3K