Proof-of-concept exploit showing how itunesstored & bookassetd daemons can be abused to escape iOS sandbox restrictions
https://hanakim3945.github.io/posts/download28_sbx_escape/
https://hanakim3945.github.io/posts/download28_sbx_escape/
Hana's Blog
itunesstored & bookassetd sbx escape - Hana's Blog
POC writeup to exploit sandbox escape in itunesstored & bookassetd
๐8๐4
GhostAd: Hidden Google Play Adware Drains Devices and Disrupts Millions of Users
https://blog.checkpoint.com/research/ghostad-hidden-google-play-adware-drains-devices-and-disrupts-millions-of-users/
https://blog.checkpoint.com/research/ghostad-hidden-google-play-adware-drains-devices-and-disrupts-millions-of-users/
Check Point Blog
GhostAd: Hidden Google Play Adware Drains Devices and Disrupts Millions of Users - Check Point Blog
Check Point researchers uncover a large-scale Android adware campaign that silently drains resources and disrupts normal phone use through persistent
๐6๐2
RadzaRat: New Android Trojan Disguised as File Manager Emerges with Zero Detection Rate
https://www.certosoftware.com/insights/radzarat-new-android-trojan-disguised-as-file-manager-emerges-with-zero-detection-rate/
https://www.certosoftware.com/insights/radzarat-new-android-trojan-disguised-as-file-manager-emerges-with-zero-detection-rate/
Certo Software | iPhone & Android Spyware Detection
RadzaRat: New Android Trojan Disguised as File Manager Emerges with Zero Detection Rate
The Android malware-as-a-service (MaaS) ecosystem continues to evolve with increasingly sophisticated threats designed to evade security measures while maintaining operational simplicity for would-be attackers.
๐14๐จโ๐ป6โค5
Is Your Android TV Streaming Box Part of a Botnet?
https://krebsonsecurity.com/2025/11/is-your-android-tv-streaming-box-part-of-a-botnet/
https://krebsonsecurity.com/2025/11/is-your-android-tv-streaming-box-part-of-a-botnet/
Krebs on Security
Is Your Android TV Streaming Box Part of a Botnet?
On the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all forโฆ
โค10โก4๐3
Turn Your Old Android Into a Privacy Box!
Pi-hole blocks ads, trackers and shady websites across your entire network - and you can run it on that old Android phone sitting in your drawer!
https://www.mobile-hacker.com/2025/11/25/pi%e2%80%91hole-on-android-turn-your-spare-smartphone-into-a-network%e2%80%91wide-ad%e2%80%91blocker/
Pi-hole blocks ads, trackers and shady websites across your entire network - and you can run it on that old Android phone sitting in your drawer!
https://www.mobile-hacker.com/2025/11/25/pi%e2%80%91hole-on-android-turn-your-spare-smartphone-into-a-network%e2%80%91wide-ad%e2%80%91blocker/
Mobile Hacker
Piโhole on Android: Turn Your Spare Smartphone into a NetworkโWide AdโBlocker
Piโhole is a networkโlevel ad and tracker blocker. Instead of installing adโblockers on each device, Piโhole runs as your DNS server, intercepting domain lookups and returning a null/blocked response for domains on curated blocklists.
โค23๐9๐ฅ7
RelayNFC: The New NFC Relay Malware Targeting Brazil
https://cyble.com/blog/relaynfc-nfc-relay-malware-targeting-brazil/
https://cyble.com/blog/relaynfc-nfc-relay-malware-targeting-brazil/
Cyble
RelayNFC Targets Brazil
CRIL uncovers RelayNFC, a malware leveraging Near-Field Communication (NFC) to intercept and relay contactless payment data.
๐8๐5โค3
Arbitrary App Installation on Intune Managed Android Enterprise BYOD
https://jgnr.ch/sites/android_enterprise.html
https://jgnr.ch/sites/android_enterprise.html
๐7๐2
Bypassing iOS Frida Detection with LLDB and Frida
https://tonygo.tech/blog/2025/8ksec-ios-ctf-writeup
https://tonygo.tech/blog/2025/8ksec-ios-ctf-writeup
tonygo.tech
Bypassing iOS Frida Detection with LLDB and Frida | Tony Gorez's Blog
A complete walkthrough of the 8ksec "FridaInTheMiddle" challenge: bypassing Frida detection, hooking Swift functions, and intercepting arguments on a jailbroken iPhone.
๐15
Hunting potential C2 commands in Android malware via Smali string comparison and control flow
https://youtu.be/BVMEHN_D-Gg
https://youtu.be/BVMEHN_D-Gg
YouTube
Hunting potential C2 commands in Android malware via Smali string comparison and control flow
Hunting potential C2 commands in Android malware via Smali string comparison and control flow
Presented at the VB2025 conference in Berlin, 24 - 26 September 2025.
โ Slides: https://www.virusbulletin.com/uploads/pdf/conference/vb2025/slides/Slides-Huntingโฆ
Presented at the VB2025 conference in Berlin, 24 - 26 September 2025.
โ Slides: https://www.virusbulletin.com/uploads/pdf/conference/vb2025/slides/Slides-Huntingโฆ
๐7๐3
[beginners] Android Recon for Bug Bounty
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
Learn how to extract APKs, find hidden endpoints & secrets before exploitation using tools such as:
APKeep, APKTool, apk2url, jadx-gui, MobSF, MARA, Drozer
https://www.yeswehack.com/learn-bug-bounty/android-recon-bug-bounty-guide
YesWeHack
Android recon for Bug Bounty hunters: A complete guide
An in-depth Bug Bounty guide to performing reconnaissance on Android apps โ from extracting APKs to mapping endpoints, secrets and vulnerable components.
๐15๐3โค2
SSL Pinning Bypass โ Android
https://hardsoftsecurity.es/index.php/2025/11/26/ssl-pinning-bypass-android/
https://hardsoftsecurity.es/index.php/2025/11/26/ssl-pinning-bypass-android/
Hardsoft Security
SSL Pinning Bypass - Android - Hardsoft Security
Here we go again! Today we will be talking about SSL Pinning Bypass in Android. Due the recent cybersecurity congress that I have assisted...
๐12
Combatting Cybercrime against Mobile Devices
This paper examines cybercrime against consumer mobile devices and their users in the UK
https://www.rusi.org/explore-our-research/publications/insights-papers/combatting-cybercrime-against-mobile-devices
This paper examines cybercrime against consumer mobile devices and their users in the UK
https://www.rusi.org/explore-our-research/publications/insights-papers/combatting-cybercrime-against-mobile-devices
www.rusi.org
Combatting Cybercrime against Mobile Devices
Joseph Jarnecki outlines the highest priority cyberthreats against consumer mobile devices and considers potential strategies to mitigate and address the threat.
๐9โก2๐คฃ1
Albiriox Exposed: A New RAT Mobile Malware Targeting Global Finance and Crypto Wallets
https://www.cleafy.com/cleafy-labs/albiriox-rat-mobile-malware-targeting-global-finance-and-crypto-wallets
https://www.cleafy.com/cleafy-labs/albiriox-rat-mobile-malware-targeting-global-finance-and-crypto-wallets
Cleafy
Albiriox Exposed: A New RAT Mobile Malware Targeting Global Finance and Crypto Wallets | Cleafy Labs
Albiriox is a newly identified Android malware family offered as a Malware-as-a-Service, and enabling TAs to perform On-Device Fraud through remote control, screen manipulation, and real-time interaction with the infected device. Read more in this report.
๐10โค2๐คฎ1๐1
IPAtool - command line tool that allows you to search and download iOS apps from the App Store, known as an ipa file
https://github.com/majd/ipatool
https://github.com/majd/ipatool
GitHub
GitHub - majd/ipatool: Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS Appโฆ
Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store - majd/ipatool
โค15๐6๐2
Charging cable that hacks your device
Once plugged in, it can:
-detect OS,
-inject keystrokes,
-controlled over Wi-Fi,
-create remote shell access without network connection of target
https://www.mobile-hacker.com/2025/12/01/plug-play-pwn-hacking-with-evil-crow-cable-wind/
Once plugged in, it can:
-detect OS,
-inject keystrokes,
-controlled over Wi-Fi,
-create remote shell access without network connection of target
https://www.mobile-hacker.com/2025/12/01/plug-play-pwn-hacking-with-evil-crow-cable-wind/
Mobile Hacker
Plug, Play, Pwn: Hacking with Evil Crow Cable Wind
Itโs a tiny hacking implant hidden inside a cable. Plug it into a computer, and it pretends to be a keyboard. Then it starts typing โ fast. Weโre talking up to 1,000 keystrokes per minute, all automated.
๐21๐ฅ8๐ญ7โค3๐3
Reverse engineering Bluetooth on Amazon Kindle eReaders
https://sighery.com/posts/reverse-engineering-bluetooth-on-kindle-ereaders/
https://sighery.com/posts/reverse-engineering-bluetooth-on-kindle-ereaders/
Sighery
Reverse engineering Bluetooth on Amazon Kindle eReaders
A journey of learning C and reverse engineering to be more efficiently lazy
๐10๐ฅ3๐1
[Beginners] All About Android Pentesting: A Complete Methodology
https://xcheater.medium.com/all-about-android-pentesting-f047b7c7e0f1
https://xcheater.medium.com/all-about-android-pentesting-f047b7c7e0f1
Medium
All About Android Pentesting: A Complete Methodology
Complete Android application security testing guide: Static & dynamic testing, root detection bypass, SSL pinning, and common vulnโฆ
๐11โค9๐ฅ5๐1
Cybercrime group GoldFactory: Distributed at least 27 legitimate banking apps injected with malicious code, targeting users in Indonesia, Vietnam, and Thailand
https://www.group-ib.com/blog/turning-apps-into-gold/
https://www.group-ib.com/blog/turning-apps-into-gold/
Group-IB
Hook for Gold: Inside GoldFactory's ะกampaign That Turns Apps Into Goldmines
A deep dive into GoldFactoryโs evolving mobile fraud campaigns across APAC, including modified banking apps, new malware variants such as Gigaflower, shared criminal infrastructure, and insights from the Group-IB Fraud Matrix, with recommendations for organizationsโฆ
๐6๐2
SEEDSNATCHER : Dissecting an Android Malware Targeting Multiple Crypto Wallet Mnemonic Phrases
https://www.cyfirma.com/research/seedsnatcher-dissecting-an-android-malware-targeting-multiple-crypto-wallet-mnemonic-phrases/
https://www.cyfirma.com/research/seedsnatcher-dissecting-an-android-malware-targeting-multiple-crypto-wallet-mnemonic-phrases/
CYFIRMA
SEEDSNATCHER : Dissecting an Android Malware Targeting Multiple Crypto Wallet Mnemonic Phrases - CYFIRMA
EXECUTIVE SUMMARY At Cyfirma, we are committed to providing up-to-date insights into current threats and the tactics used by malicious...
๐4
Mobile Forensics: Extracting Data from WhatsApp on already rooted device or with using Cellebrite to gain elevated privileges
https://hackers-arise.com/mobile-forensics-extracting-data-from-whatsapp/
https://hackers-arise.com/mobile-forensics-extracting-data-from-whatsapp/
โค3๐1
