top | item 21344441

(no title)

aiCeivi9 | 6 years ago

> First, the malicious app tries to determine whether it is being tested by the Google Play security mechanism. For this purpose, the app receives from the C&C server the isGoogleIp flag, which indicates whether the IP address of the affected device falls within the range of known IP addresses for Google servers. If the server returns this flag as positive, the app will not trigger the adware payload.

I can't believe something so simple worked so well.

discuss

order

No comments yet.