The $50,000 Android Banking Trojan:

Intro

  • Availability of bank logs, cards and emails etc..

Source code Analysis

Presence of injections

Uses a switch case statement for commands

Updating the logs

Presence of known constants

Functions used for upadting the log data

Conclusion

--

--

--

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to hack windows 10 with an image

There is something wrong with your request. Clear your cookies, check your request, and try again.

3X ETH/USD X2 FeeSplit Tokens Distribution

Open Source Cyber Scavenger Hunt — Run Your Own (even on a budget)

The Road to Hell is Paved with Bad Passwords

Privacy Policy

[SIEM] Threat Hunting with Indicator Of Attack(IoAs)

How To Access Another AWS Account Resources via STS?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Andy InfoSec

Andy InfoSec

More from Medium

RWE experts join Vara’s Advisory Council

11 Steps to Peace in times of War

Mono Repo vs Multi Repo

The Dangerous Portrayal of Mental Illness in the Media.