After nearly half a year I found some time today to update the mobile malware overviews for iOS and Android. I hope that I did catch everything that came up in the meantime, if not, please let me know which malware family is missing in the overviews.
Some weeks ago I did a short presentation on this years German OWASP day in Frankfurt and I would like to publish the most important points of our research here as well.
Reversing Android applications is something I’m doing very regularly. Thus, I thought writing some small and simple step by step guides for available tools could be helpful for the community, especially for people that are just starting to work on this topic.
Today I will start with Androguard, but I hope that there will be enough time in the future to continue those guides for other tools.
The posts about how to break the screen lock are very frequently visited. This is why I thought it’s time to give you a short update and provide you with a Python script, that can do most of the attack in an automated way.
In 2014 our Mobile-Sandbox analyzed over 100,000 Android applications that were submitted by mostly anonymous users, Anti-Virus-Companies and by our own. In the same time we updated our system several times with new features and we modified the backend and the analyzing extensions. These updates unfortunately resulted in some downtimes and a clean database and we are still working to get all the data back in the system and to get everything running again.
Most of these malicious applications had been downloaded from Third-Party markets, but we also found some malware families with samples that had originally been downloaded from Google-Play. When looking at the malicious and unwanted applications and the corresponding families, one can see the following distribution of malicious behavior: