Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Wenjun Hu

Android Malware Impersonates ChatGPT-Themed ApplicationsA pictorial representation of Android malware impersonating ChatGPT
25,504
people reacted

Android Malware Impersonates ChatGPT-Themed Applications

  • By Lee Wei Yeong, Xingjiali Zhang, Yang Ji, Wenjun Hu and Royce Lu
  • June 15, 2023 at 6:00 AM

513

9 min. read

An AI Based Solution to Detecting the DoubleZero .NET WiperConceptual image representing malware detection, including the machine learning model that can analyze the DoubleZero .NET wiper.
56,176
people reacted

An AI Based Solution to Detecting the DoubleZero .NET Wiper

  • By Akshata Rao, Zong-Yu Wu and Wenjun Hu
  • November 18, 2022 at 6:00 PM

8

7 min. read

Trending

  • Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month by Unit 42
  • Threat Group Assessment: Muddled Libra (Updated) by Unit 42
  • Wireshark Tutorial: Display Filter Expressions by Brad Duncan
  • Wireshark Tutorial: Changing Your Column Display by Brad Duncan
  • Threat Group Assessment: Turla (aka Pensive Ursa) by Unit 42
BlueSky Ransomware: Fast Encryption via MultithreadingRansomware conceptual image, covering groups including BlueSky Ransomware
85,505
people reacted

BlueSky Ransomware: Fast Encryption via Multithreading

  • By Muhammad Umer Khan, Lee Wei, Yang Ji and Wenjun Hu
  • August 10, 2022 at 12:00 PM

1142

7 min. read

Digium Phones Under Attack: Insight Into the Web Shell ImplantA conceptual image representing attacks on mobile, such as the recent malicious activity targeting Digium phone software.
57,155
people reacted

Digium Phones Under Attack: Insight Into the Web Shell Implant

  • By Lee Wei, Yang Ji, Muhammad Umer Khan and Wenjun Hu
  • July 15, 2022 at 6:00 AM

1057

7 min. read

Mac Malware Steals Cryptocurrency Exchanges’ Cookies

  • By Yue Chen, Cong Zheng, Wenjun Hu and Zhi Xu
  • January 31, 2019 at 6:00 AM

53

5 min. read

39,171
people reacted

Hidden Devil in the Development Life Cycle: Google Play Apps Infected with Windows Executable Files

  • By Yue Chen, Wenjun Hu, Xiao Zhang and Zhi Xu
  • July 30, 2018 at 5:00 AM

22

4 min. read

65,413
people reacted

Android Toast Overlay Attack: “Cloak and Dagger” with No Permissions

  • By Cong Zheng, Wenjun Hu, Xiao Zhang and Zhi Xu
  • September 7, 2017 at 1:00 PM

9

7 min. read

96,293
people reacted

SpyDealer: Android Trojan Spying on More Than 40 Apps

  • By Wenjun Hu, Cong Zheng and Zhi Xu
  • July 6, 2017 at 8:00 AM

25

20 min. read

47,861
people reacted

A New Trend in Android Adware: Abusing Android Plugin Frameworks

  • By Cong Zheng, Wenjun Hu and Zhi Xu
  • March 22, 2017 at 1:00 PM

29

7 min. read

65,909
people reacted

Google Play Apps Infected with Malicious IFrames

  • By Xiao Zhang, Wenjun Hu and Shawn Jin
  • March 1, 2017 at 5:00 AM

26

6 min. read

Rootnik Android Trojan Abuses Commercial Rooting Tool and Steals Private Information

  • By Wenjun Hu, Claud Xiao and Zhi Xu
  • December 4, 2015 at 3:00 PM

15

12 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.