Unit 42 uncovers 145 malicious Google Play apps. Get the full report.
Unit 42 goes inside the coop with new analysis and additional information on malicious HenBox applications
Unit 42 examines the Reaper Group’s updated mobile arsenal, including a Bitcoin Ticker Widget and a PyeongChang Winter Games application.
Unit 42 discovers TeleRAT, an Android Trojan abusing Telegram’s Bot API for command and control and data exfiltration.
Unit 42 discovers HenBox, an Android Malware family masquerading as legitimate apps on third-party app stores.
Get an overview of the Meltdown and Spectre vulnerabilities including a risk assessment and calls to action.
2 Minute Threat Brief: Android Toast Overlay Attack.
Palo Alto Networks Unit 42 researchers share details of a new high severity vulnerability affecting the Google Android platform.
Palo Alto Networks Unit 42 researchers have uncovered a high severity vulnerability in the Android overlay system, which allows a new Android overlay attack by using the “Toast type” overlay.
Palo Alto Networks researchers discovered an advanced Android malware we’ve named “SpyDealer” which exfiltrates private data from more than 40 apps and steals sensitive messages from communication apps by abusing the Android accessibility service feature
Threat actors use popular android applications to mask Ewind adware.
This post explores how the attackers attempt to gain a foothold into target networks before briefly describing the malware families used.
Unit 42 researchers discover Google Play apps infected with malicious IFrames.
Recently, we discovered a new Google Android Trojan named “PluginPhantom”, which steals many types of user information including: files, location data, contacts and Wi-Fi information. It also takes pictures, captures screenshots, records audios, intercepts and sends SMS messages. In addition, it can log the keyboard input by the Android accessibility service, acting as a keylogger.
Over the past two years, we’ve observed many cases of Microsoft Windows and Apple iOS malware designed to attack mobile devices. This attack vector is increasingly popular with malicious actors as almost everyone on the planet carries at least one mobile device they interact with throughout any given day. Thanks to a relative lack of