Главная
Study mode:
on
1
Intro
2
Repackaging an app and using custom ads
3
What is a click fraud malware?
4
Click fraud for everything
5
Step 1: download and execute exploits
6
Step 2: enable accessibility services you
7
Account creation
8
Phone numbers are supplied by the C&C
9
Code injection
10
to get the CAPTCHA image...
11
and solve it...
12
and hook internal methods...
13
and hook a bit more
14
Obfuscation: DES
15
Persistence (1): writing to install-recovery.sh
16
Persistence (II): installing apps in /system
17
Persistence (1ll): framework modification
18
Persistence (IV): injecting into
19
Persistence summary
20
Timeline of the author's creations
Description:
Explore the intricate world of Android malware in this 38-minute conference talk from the Hack In The Box Security Conference. Delve into the complex "Zen" campaign and other harmful Android apps, uncovering sophisticated techniques used by malware authors to monetize their creations. Learn about root access exploitation, fake Google account generation, click fraud, and spam apps. Discover how these malicious actors circumvent security measures, including CAPTCHA bypass and various persistence mechanisms. Gain insights into the evolution of Android malware, from simple app repackaging to advanced rooting trojans, and understand the challenges posed by improving Android security. Follow along as Łukasz Siewierski, a Reverse Engineer on the Android Security team at Google, breaks down the technical details and presents a timeline of the malware author's creations.

Zen - A Complex Campaign of Harmful Android Apps

Hack In The Box Security Conference
Add to list
0:00 / 0:00