med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

421
active users

#apk

1 post1 participant0 posts today

Newly Registered Domains Distributing SpyNote Malware

Cybercriminals are employing deceptive websites on newly registered domains to distribute AndroidOS SpyNote malware. These sites imitate the Google Chrome install page on the Google Play Store, tricking users into downloading SpyNote, a powerful Android remote access trojan. SpyNote is used for surveillance, data exfiltration, and remote control of infected devices. The investigation uncovered multiple domains, IP addresses, and APK files associated with this campaign. The malware utilizes various C2 endpoints for communication and data exfiltration, with functions designed to retrieve and manipulate device information, contacts, SMS, and applications.

Pulse ID: 67feb504b76dd387be73309b
Pulse Link: otx.alienvault.com/pulse/67feb
Pulse Author: AlienVault
Created: 2025-04-15 19:35:32

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
#APK#Android#Chrome

We're starting to implement support for split APKs in #FDroid. #Google wants to gather as much data about its users as possible, so trying to hide info about language, country, device specs was not a design concern for them. It is central for us. We want the official client to leak as little data as possible to any server, be it ours, mirrors, or custom repos. We welcome input:

gitlab.com/fdroid/fdroidclient

GitLabsupport split APKs as first class packages (#2963) · Issues · F-Droid / Client · GitLab!1508 is the first step for supporting split APKs, specifically...

Ich versuche zurzeit wieder, etwas mehr auf meine Ernährung zu achten und tracke dabei auch meine Nahrung, da ich ein besseres Gefühl dafür bekommen will, was ich esse und vor allem welche Mengen es sind. Habe dafür #Energize bei #fdroid runtergeladen und vor kurzem habe ich noch die #foss #App #OpenNutriTracker entdeckt und teste sie nebenbei. Wirkt bisher ganz nett und ist auch sehr angenehm zu bedienen. Habe sie aktuell noch nicht bei #fdroid entdeckt, aber über #Github kann man sich auch die #APK runterladen.

simonoppowa.github.io/OpenNutr

simonoppowa.github.ioOpenNutriTrackerImprove your health, lose weight, or simply maintain a balanced diet

@Frau_Mensch bevor jemand fragt, #Molo ist NICHT im #FDroid Store verfügbar, aber als #APK. Außerdem ist die App Angeblich #OpenSource, wobei ich den Code nirgendwo finden konnte.
Und der Absatz dazu auf der Webseite ist etwas irritierend, dort heißt es "Open Source

Transparenz ist uns wichtig. Alle lokalen Infos erreichen dich ohne Vorsortierung durch einen undurchsichtigen Algorithmus. Der Programmcode ist zudem Open Source."
Warum ist ein undurchsichtiger Algo. Gut?🤔Und wo ist der Quellcode?

PCAPdroid is a privacy-friendly app which lets you track and analyze the connections made by the other apps in your device.
It also allows you to export a PCAP dump of the traffic, inspect HTTP, decrypt TLS traffic and much more.

PCAPdroid simulates a VPN in order to capture the network traffic without root. It does not use a remote VPN server, instead data is processed locally on the device.

https://f-droid.org/en/packages/com.emanuelef.remote_capture/

#fdroid #networking #security #apk #privacy
f-droid.orgPCAPdroid | F-Droid - Free and Open Source Android App RepositoryNo-root network monitor and traffic dump tool for Android devices
Replied in thread

@r @torproject @m0xee @jeffcliff @thendrix @gabriel @sj_zero @Suiseiseki The last time Tor browser crapped itself INSTANTLY was shortly after i loaded this ARCHIVED VERSION OF this page (@internetarchive). Someone on fedi shared the, iirc, non-archived version of this link and i was curious.

I made a note of the browser crash in october, i must've had JS enabled because my note says "reqJs"

I have only just in the past few days had a chance to READ the note and revisit the page. As a part-time "coincidence suspector" I find it interesting that loading that page caused my browser to die instantly.... it doesn't now (not that that means much). If i had a chance to read it in october i'd have had a good few things to say about so-called "(#wateringHole) attacks". I feel a *cough* coming on....

The following are mentioned in the atricle, as attacked sites (my notes in parenthesis):

- #rojnews .news * COUGH* (#cloudflare (cf), not visited)
- #hawarnews .com (cf, not visited)
- #targetplatform .net (packed with youtube videos, seems westernized)

I'd be VERY interested to know whether the sites above were cf during/before this attack but either way this is quite concerning, if the site was cf before the attack that could address HOW those sites were breached in the first place. If cf during the attack, then cf has failed in its mission to protect from the #cyberattack. If the sites became cf after, then we must ask do sites immediately become cf'd when a problem emerges? Would Kurdish outlets knowingly have a policy like that? Do the site owners EVEN KNOW the site is cf? This is not as silly a question as it sounds.

Next i checked #kurdish news sites found in my own searches (with notes):

- #kurditv .com * STILL COUGHING* (requires #google js(without integrity checks?!) to view videos!)
- #kurdistanobserver .com (on googl servers, not visited)
- #thekurdishproject .org (cf, not visited (NV))
- #infopig .com (down at time of test)
- #iranpressnews .com (cf, NV)
- #ekurd .net (cf, NV)
- #kurdpa .net (cf, NV)
- #newslive .com (cf NV)
- #kurdistan24 .net (cf NV)
- #basnews .com (cf NV)
- #kurdistantv .net (cf NV)
- #zagrosnews .net (cf NV)
- #kurdistanin .net (googl non-integrity checked js.... bunny, cf and amazon cloudfront resources)
- #kurdistantribune .com (fetches non-integrity checked statcounter (cf) js, which is blocked by uBlockOrigin if u use TorBrowser in TailsOS. Uses youtube, feedburner (cf), #facebook and #twitter/ #fastly fetches snitch on the EXACT articles u read(!!!), with twitter js not being integrity checked)

WATERING HOLE ATTACK RATING = EXTREME
DIGITAL COLONIALISM INDEX = 99%?

*END COUGH* (yeah i spent a few good hours coughing this up like a bad furball) :acat_chew:

The article itself is not even very complete.... how are the supposed #APK files/apps getting manually(?) approved and installed on peoples' devices? .... @fdroidorg should be so lucky. Maybe the fdroid team need to take a feather from this hackers black hat? am i missing something here or does this story SMELL a bit?

Thoughts?

The Hacker NewsWatering Hole Attack on Kurdish Sites Distributing Malicious APKs and SpywareSilentSelfie cyberattack targets 25 Kurdish websites, harvesting sensitive data via malicious APKs and tracking scripts.

linuxiac.com/openwrt-adopts-ap

OpenWrt has announced the replacement of its OPKG package manager with Alpine Linux's APK.

APK is described as: lightweight, efficient, and offers advanced features, Which the developers say will make OpenWrt more capable.

The change only affects future releases, with the current stable branch remaining unchanged.

Linuxiac · Major Overhaul: OpenWrt Adopts Alpine's APK as New Package ManagerStarting in November 2024, OpenWrt's snapshots and future stable builds will replace OPKG with APK for better package management.
#OpenWRT#apk#alpine

Heute ist es soweit! Der vierte #Warntag in Deutschland. Irgendwann muss es ja schließlich klappen 😜

Falls ihr ein #Android Smartphone euer Eigen nennt, stellt mal kurz die Tasse weg. Für iOS findet ihr sicherlich auch jemensch, der*die es euch erklären kann.

Öffnet die #Einstellungen und sucht nach #Notfallbenachrichtigung. Dort gibt es verschiedene Toggles. Hier sollte eines für Tests auch eingeschalten sein. Im US-Amerikanischen Raum wird es #AMBERalert genannt, bei uns #DEalert oder #EUalert.

Meiner Erfahrung nach ist es standardmäßig aus.

Wenn euer Smartphone oder Tablet also in vier, fünf Stunden im Netz eingebucht ist, sollte es ein Warnsignal geben. Wie es bei Gehörlosen ist, weiß ich nicht. Gehe von Vibrationen aus. Vielleicht auch Flashlight. Außer Samsung verbaut ja kein Hersteller Funktionalität für diese Zielgruppe. Die haben da auch eine Bildstrecke zusammengestellt:

Notfall-Benachrichtigung für Mobilgeräte | Samsung DE
https://www.samsung.com/de/support/mobile-devices/notfallbenachrichtigung/

Es empfiehlt sich, auch eine Warn-App zu installieren. Etwa #NINA. Unter #FDroid gibt es „FOSS Warn“ (inoffiziell). Das hab ich hier laufen. #Degoogled
Mir wäre ein #APK vom Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (#BBK) ja auch lieber, aber aus irgendeinem Grund verteilt kaum wer über die eigene Homepage 🤷

Weitertrinken. Wir schaffen das!

Für Opfer häuslicher Gewalt kann der Warntag heute Konsequenzen haben. Besser das Gerät komplett herunterfahren.

Samsung deNotfall-Benachrichtigung für Mobilgeräte Was ist Notfall-Benachrichtigung für Mobilgeräte? ✓ Warnmeldungen bei Katastrophen & Risiken ✓ Wie funktioniert Cell Broadcast? ► Hier mehr erfahren
Continued thread

So why upcycle Android instead of just buying new?
1. Minimize ewaste and give purpose to/extend the lifetime of older but working devices.
2. An updated version of Android often means better security (and sometimes better performance).
3. Removal of bloatware, having a deGoogled mobile experience, and more user freedom.

Got an old mobile device? Maybe we can give it new life.