A sophisticated malware family has enough code similarities to indicate that it shares a common origin with SlemBunk.Read more...
Entries filed under 'Android'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
A Growing Number of Android Malware Families Believed to Have a Common Origin: A Study Based on Binary CodeMarch 11, 2016 5:08 PM By Wu Zhou, Junyuan Zeng, Jimmy Su, Linhai Song | Threat Research, Advanced Malware
May 5, 2016 8:00 AM By Jake Valletta | Vulnerabilities, Threat Research
A vulnerability present on Android devices allows a seemingly benign application to access sensitive user data: including SMS and call history and the ability to perform potentially sensitive actions such as changing system settings or disabling the lock screen.
April 26, 2016 8:30 AM By Wu Zhou, Jimmy Su, Yong Kang , Deyu Hu | Mobile Threats, Threat Research
Smishing (SMS phishing) offers a unique vector to infect mobile users. FireEye Labs recently discovered a RuMMS campaign, which threat actors are using to distribute their malware. They are using shared-hosting providers, which adds flexibility to the threat actor’s campaign and makes it harder for defending parties to track these moving targets.Read more...
August 19, 2015 11:15 AM By Mariam Muntaha, Fuaad Ahmad, Jimmy Su | Mobile Threats, Threat Research
January 20, 2015 3:10 PM By Vishwanath Raman, Yulong Zhang, Adrian Mettler, Malte Isberner | Mobile Threats, Threat Research
FireEye analyzed the most popular Android applications available in the Google Play store and found that a significant number of them do not encrypt sensitive data with strong cryptography, leaving them vulnerable to hackers.