gps


Once again, SherlockDroid/Alligator spotted a potentially unwanted application for us. The application is a Chinese flirting social networking application whose security level is distressingly low. We detect it as Riskware/Blued!Android. Figure 1. It is probably okay members of the social network get information on you. But is it okay for you that everybody - mom, dad, neighbours, boss... - does? The application is leaking no less than user name, email, height, weight, birthdate, city and GPS coordinates. Figure 2. Intercepted packet revealing... [Read More]
by RSS Axelle Apvrille  |  Jul 25, 2014  |  Filed in: Security Research
Those last few months, we have been using and tuning a data mining engine developed by researchers of Telecom ParisTech. The tool is named Alligator, mostly because we believe alligators are hungry animals :) (and a little because this means "AnaLyzing maLware wIth partitioninG and probAbiliTy-based algORithms"). Integrated in our own crawling, property extraction and reporting architecture, the engine helps us spot suspicious packages among the huge load of Android applications. Recently, as we were tuning our framework, Alligator reported a... [Read More]
by RSS Axelle Apvrille  |  Aug 02, 2013  |  Filed in: Security Research