Maxime Ingrao
@IngraoMaxime
Followers
483
Following
76
Media
21
Statuses
43
French security researcher / Lead R&D at @EvinaTech
Joined October 2019
0
0
1
Three games have been downloaded a lot in the last two weeks : com.ninetytwo.advance[dot]car.parking.impossible[dot]city[dot]drive com.simgames.drag[dot]racing.simulator com.tgames.motor.stunt.master At #Evina we received millions of fraud attempts which we blocked.
1
0
1
Apps : com.pixel.creationing (removed) com.painting.oil.watercolor (removed) paintboard.digstal (removed) com[DOT]pixel[DOT]brush[DOT]art C2 : 157[DOT]245[DOT]199[DOT]116 CC @malwrhunterteam
@mobilesecurity_
@ReBensk
@phonandroid
@Cyb3rguerre
@LukasStefanko
0
0
5
To promote the applications, fraudsters create Google Ads campaigns. This enables them to quickly climb the Play Store rankings.
1
0
2
The malware hides in a native library. To execute it, the library checks that the phone is not rooted and not uses RE tools it also checks if the app is downloaded from an ad. It then downloads a file containing malicious code with an image url, and load it.
1
0
4
App package : com.vanjan.sms (100k+ downloads, still on Play Store) CC @malwrhunterteam @mobilesecurity_ @LukasStefanko @Cyberdost
0
0
5
This deleted application was created by the same developer as the ActivationPW application (still on the Play Store) that contains the activation[dot]pw website that allows you to buy the accounts with infected phones
2
0
4
How did I find the website that uses the infected phones? The malware sends data to the domain goomy[dot]fun Looking at VirusTotal, we can see that this domain was used by an application called VirtualNumber which has been removed from the Play Store
1
0
4
The malware ask the phone number of the user in the first screen. Then it pretends to load the application but remains all the time on this page, it is to hide the interface of the received sms and that the user does not see the sms of subscriptions to the various services
1
0
4
2
1
3
com.razer.keyboards (10k+)Β https://t.co/dLmVIkvKEh.editor (1M+) β com.okcamera.funny (500K+)Β https://t.co/8fyEMql0bj (1k+) β app.launcher.creative3d (1M+) β com.gif.emoji.keyboard (100K+) β https://t.co/W5wjm83pDV (5K+) β https://t.co/cju9S26Nny (100K+) β
1
0
9
To promote the applications, fraudsters create several Facebook pages and run ads on Facebook and Instagram. For example, there were 74 ad campaigns for Razer Keyboard & Theme malware
1
1
11
It retrieves a JSON on the C2 address: 68.183.219.190/pER/y It then executes the urls, for some steps it executes the urls on a remote browser and returns the result to include it in the requests This allows it not to have a Webview and to be more discrete
1
0
18
Found new family of malware that subscribe to premium services π 8 applications since June 2021, 2 apps always in Play Store, +3M installs ππ No webview like #Joker but only http requests Letβs call it #Autolycos πΎ #Android #Malware #Evina
5
55
114
Two new malwares that steal Facebook credentials : π· Neon 3D Effect +100k installs (com.eachannkeefei.neoneffectedit) π· Collage Maker +50k installs (com.baugulfbergg.photocollagemaker) Always apps ranked in the top new apps photography #Android #Malware #StealFB #Evina
I found some malwares in the top new free apps of the Play Store that steal Facebook credentials and datas.π These apps require you to sign in to your fb account to access the content of the app and collect the credentials. +500K installs #Android #Malware #Trojan #Facebook
0
3
6
Apps : https://t.co/nH6lgcGKBF
https://t.co/TCFOBfRo5e (REMOVED) CC @malwrhunterteam @mobilesecurity_ @bl4ckh0l3z @Frandroid
1
0
4
The malware is very interested in the advertising campaigns you might have done and if you have a registered credit card. This allows him to create his own advertising campaigns with your account, so he can use your credit card for his own ads.
1
1
5