ANDROID APP

Conceal Android Purposes in Pictures



By Axelle Apvrille

“Malware authors are at all times considering concealing their targets to evade detection.

We’ve found a method which allows them to cover no matter payload they want in an Android bundle (APK).

The malicious payload is encrypted with AES, thus its reverse engineering doesn’t give in any ingredient.

Furthermore, opposite to basic perception, it’s truly attainable to govern the output of encryption and have it seem like, as an illustration, a selected picture. Thus, the encrypted malicious payload might be crafted to seem like a fully real picture (of Anakin Skywalker ;).

We reveal with a Proof of Idea utility that the assault works on present Android platforms, and we additionally clarify the way it works and the way the payload is crafted.

This speak will not be (or solely little or no) about cryptography. Understanding file codecs, that is the magic :).”

source