I suspect the average person who installs apps outside of the play store is still much more likely to be infected via malware that dodged the playstore's detection than the apps they install from other sources, because there's usually considerable trust involved with the other sources.
In particular they're usually f-droid and open source apps compiled by f-droid.
It has to do with setting the device owner, and gaining those powers; enabling / disabling apps, remote wipe, etc.. It's a local privilege escalation attack and doesn't require user interaction.
Is this guy going to make a slop repo for every new CVE in a high-profile product advisory so he can rack up some stars and put this shit on his resume? Jesus fuck.
This is just polluting the namespace and making it harder for blue teamers and incident responders to share IOCs.
His repos either lack a PoC and just contain a README with more emojis than facts; try to pass a public version checker off as a PoC; or invent a non-working PoC in the absence of technical details.
charcircuit|2 months ago
pogue|2 months ago
gpm|2 months ago
In particular they're usually f-droid and open source apps compiled by f-droid.
barrkel|2 months ago
It has to do with setting the device owner, and gaining those powers; enabling / disabling apps, remote wipe, etc.. It's a local privilege escalation attack and doesn't require user interaction.
4ndrewl|2 months ago
weberer|2 months ago
nutjob2|2 months ago
True, it says almost nothing of value about the exploit, but it does teach us that 30% is almost one in three.
da_grift_shift|2 months ago
This is just polluting the namespace and making it harder for blue teamers and incident responders to share IOCs.
His repos either lack a PoC and just contain a README with more emojis than facts; try to pass a public version checker off as a PoC; or invent a non-working PoC in the absence of technical details.
Bullshit asymmetry.