home.social

#badbazaar — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #badbazaar, aggregated by home.social.

  1. Governments identify dozens of #Android #apps bundled with #spyware
    #BadBazaar and #Moonshine, which have been previously analyzed by cybersecurity firms and digital rights nonprofit #CitizenLab, were used to target #Uyghurs, #Tibetans, and #Taiwanese communities. These two spywares hid inside legitimate-looking apps, acting essentially as “trojan” #malware, with #surveillance capabilities such as access the phone’s cameras, microphone, chats, photos, and location data.
    techcrunch.com/2025/04/09/gove

  2. Das australische Cybersicherheitszentrum hat zusammen mit anderen ein Warnung zu schadhaften Apps veröffentlicht.
    Unter den Namen #BadBazaar und #Moonshine verbirgt sich eine #Spyware. Diese kann auf Kamera, Mikrofon und einiges mehr zugreifen. Ziel der Malware sind Gruppen von Uighuren, Tibetanern und Taiwanesen.

    ncsc.gov.uk/files/NCSC-Advisor

    Technische Details:
    ncsc.gov.uk/files/NCSC-Advisor

    #malware #android

  3. I hope everyone is enjoying their weekend!

    The Volexity researchers have been tracking the APT known as #EvilBamboo for over 5 years. Recently they have been targeting #Android devices and creating fake websites and social media profiles to help deploy the browser-based exploits. They have been using three different Android spyware that have been dubbed #BadBazaar, #BadSignal, and #BadSolar. This is an extremely informative and enjoyable article that covers a lot of technical details! Enjoy and Happy Hunting!

    EvilBamboo Targets Mobile Devices in Multi-year Campaign
    volexity.com/blog/2023/09/22/e

    #CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

  4. @volexity's #theatintel team works with some of the most targeted groups in the world. Today, at the LABScon conference, we are sharing details of a long-running campaign by EvilBamboo. We have also just published details on our blog: volexity.com/blog/2023/09/22/e.

    Our analysis has uncovered evidence of the attacker building online communities on various social media & messaging platforms, creating fake personas on social media sites, and using other #socialengineering techniques in order to distribute #Android malware, including #BADBAZAAR. Additionally, there is strong evidence of #iOS device targeting and likely exploitation using IRONSQUIRREL.

    #dfir #security