Главная
Study mode:
on
1
Introduction
2
How FluBot Works
3
FluBot Control Panel
4
Connection to C2 Server
5
Application Layer Protocol
6
Custom Encryption
7
How FluBot spreads
8
FluBot features
9
Defenses
Description:
Explore the intricacies of FluBot, a sophisticated Android malware, in this 33-minute talk by Isaac Dixon at Churchill College, Cambridge. Delve into the malware's unique overlay attack strategy for impersonating banking apps and stealing user credentials. Examine FluBot's robust countermeasures against detection, analysis, and mitigation. Gain insights into the malware's client operations, protocol, and backend infrastructure. Learn about its custom encryption, spreading mechanisms, and key features. Understand the connection to the Command and Control (C2) server and the application layer protocol. Conclude with a discussion on potential defenses against this formidable threat in the mobile security landscape.

FluBot

Churchill CompSci Talks
Add to list
0:00 / 0:00