Xenomorph - explanation how new Android banking Trojan steals user banking credentials | Google Play

Ғылым және технология

This is a video demonstration of newly discovered Android banking malware by @ThreatFabric and found on Google Play Store with over 50,000 installs.
In the video I explain how Xenomorph tricks victims and steals their banking credentials by displaying phishing overlay activity over the legitimately launched app by user.
Read more about this threat: www.threatfabric.com/blogs/xe...

Пікірлер: 53

  • @techywarrior1190
    @techywarrior11902 жыл бұрын

    Loved your video and huge fan sir, Please tech how to code them or make videos de-compiling them😀❤️❤️

  • @mahimmasrafi7205
    @mahimmasrafi72052 жыл бұрын

    Informative and really helpful.. Subscribed..

  • @Ebiko
    @Ebiko Жыл бұрын

    I love that this shows in Detail what the malware is about and how it works, but the news just spread yesterday like a wildfire with gasoline 😅 Without the hint to just not allow access ability service

  • @shadowhacker5164
    @shadowhacker51642 жыл бұрын

    Hello sir full video??

  • @bibhashpodh1074
    @bibhashpodh10742 жыл бұрын

    Hey bro how can we build our own Android Monitoring apk for android 🙏🙏🙏

  • @iqlessmemes4115

    @iqlessmemes4115

    2 жыл бұрын

    kzread.info/dash/bejne/g6yG25ushrizgbg.html

  • @fightingcarl3930
    @fightingcarl39302 жыл бұрын

    hey dude i saw your video where you reproduced instagram glitch, on that video u captured requests of instagram android. i tried that but burp says something like client failed to negotiate tls connection and did not capture any request from instagram. i dont know where i am doing wrong can u please help me out

  • @san-shiv
    @san-shiv2 жыл бұрын

    Which laptop you use

  • @vipulmohan1229
    @vipulmohan12292 жыл бұрын

    Can u plz make vidio for get acces for monitoring on another phone

  • @abhishekkushwaha4947
    @abhishekkushwaha49472 жыл бұрын

    Big fan sir ❤️❤️❤️ love you

  • @noone-sr3vo
    @noone-sr3vo2 жыл бұрын

    open usb debuging mode on broken screen plss

  • @sanjayrauniyar5111
    @sanjayrauniyar51112 жыл бұрын

    Big fan sir love from Nepal 🇳🇵❤️

  • @ebisaguyo8199
    @ebisaguyo8199 Жыл бұрын

    Hey Bro how to root android phone version 8.1.0

  • @COPYriGhtcom-oo6ho
    @COPYriGhtcom-oo6ho2 жыл бұрын

    How-to root vivo y31

  • @Londons.finestxxx
    @Londons.finestxxx7 ай бұрын

    Where can i get this app from

  • @ucandoit364
    @ucandoit3642 жыл бұрын

    Am a big fan sir...I want to learn

  • @dumpaikumar3191
    @dumpaikumar31912 жыл бұрын

    Hi bro which phone you use send me plz 😁🙏 bro and your best phone for hacking with monitor mode wifi supported

  • @josemariazentenoperez5499
    @josemariazentenoperez5499 Жыл бұрын

    how can i unlock a phone with macropay lock from IMEI 🔒🔒

  • @daisyhere
    @daisyhere2 жыл бұрын

    Bro your channel unbanned? I think so I was having a channel it got removed from KZread it was again some stupid policies and many KZreadrs can't upload eg: null byte. We just give education KZread Should take care 😭

  • @OneAndOnlyZekePolaris
    @OneAndOnlyZekePolaris11 ай бұрын

    If you are already logged into your account and the app asks you to log in. That is a dead giveaway that there is a trojan trying to steal your information. In other words, Xenomorph isn't that good of a trojan if you can still spot it.

  • @ajaysoni7833
    @ajaysoni78332 жыл бұрын

    It,s also binded with whatsapp buisness and PicsArt

  • @adminxds

    @adminxds

    2 жыл бұрын

    No

  • @ajaysoni7833

    @ajaysoni7833

    2 жыл бұрын

    @@adminxds checked on virustotal total extract apk and scan it

  • @adminxds

    @adminxds

    2 жыл бұрын

    @@ajaysoni7833 is whatsapp buisness asked for accessibility permissions?

  • @ajaysoni7833

    @ajaysoni7833

    2 жыл бұрын

    @@adminxds the trojan is similar like xenomorph called rotexy & it,s available on Play Store whatsapp buisness it,s also binded with pics arts When you scan it on virustotal

  • @OneAndOnlyZekePolaris
    @OneAndOnlyZekePolaris11 ай бұрын

    Question why are you charging the phone when it is fully charged?

  • @matti0449

    @matti0449

    12 күн бұрын

    he was using adb

  • @OneAndOnlyZekePolaris

    @OneAndOnlyZekePolaris

    11 күн бұрын

    @@matti0449 That makes no sense since adb is not used for charging a device that is already charged. Also my device disables charging when using this because it takes up cord room. They can only transfer so much data.

  • @dolanD2
    @dolanD22 жыл бұрын

    Antivirus for android? You were joking, right?

  • @eg.masumbillah7602
    @eg.masumbillah76022 жыл бұрын

    tutorial please

  • @mobilehacker

    @mobilehacker

    2 жыл бұрын

    tutorial how to analyze such apps?

  • @androdeveloper7261

    @androdeveloper7261

    2 жыл бұрын

    @@mobilehacker Yes

  • @smarthdroid9834
    @smarthdroid98342 жыл бұрын

    I ask permission to use this video. give it to me friend and I will give credits to your channel

  • @LEKIPE1
    @LEKIPE111 ай бұрын

    Where can I get a sample of this malware

  • @pedrobandeira7079

    @pedrobandeira7079

    9 ай бұрын

    I wanna too. Maybe we can search it together

  • @lalchigamer5221
    @lalchigamer52212 жыл бұрын

    Sir We can hack Android phone permanently on WAN? If it,s possible so make video on it

  • @ayaspathan1289
    @ayaspathan1289 Жыл бұрын

    Kali linux install android per video banao

  • @OneAndOnlyZekePolaris
    @OneAndOnlyZekePolaris11 ай бұрын

    Xenomorph is just a copyright law breaking because that is a name of something already. All hacks are copyright infringements.

  • @abhishek_bhardwaj
    @abhishek_bhardwaj2 жыл бұрын

    Sir.. can you share this apk for study purpose

  • @livegameing4647
    @livegameing4647 Жыл бұрын

    Make a video on android pattern hack

  • @AkashKumar-kp3bv
    @AkashKumar-kp3bv2 жыл бұрын

    Bro your video nice 😉

  • @Zappexe
    @Zappexe2 жыл бұрын

    Accessibility service abuse - classic

  • @androdeveloper7261

    @androdeveloper7261

    2 жыл бұрын

    Overlay permission abused

  • @Zappexe

    @Zappexe

    2 жыл бұрын

    @@androdeveloper7261 You can see in the demo that trojan app requested accessibility service permission, otherwise it wouldn't able to catch events when victim application starts and inject it's own activity or draw overlay.

  • @androdeveloper7261

    @androdeveloper7261

    2 жыл бұрын

    @@Zappexe Yes , it requested accessibility but for another reason. Accessibility is only required to automate input events on other apps. Here, It is granted "Draw over other apps" permission (Either explicitly or implicitly ) So that now app can show its fake login page on top of different apps. For detecting events, No explicit permission is needed ( Except Usage access). There is a background service continuously itrating over current activities and then detecting which is on top. ~ That's a easy approach.

  • @bibhashpodh1074
    @bibhashpodh10742 жыл бұрын

    first😍

  • @lazizkhan1
    @lazizkhan12 жыл бұрын

    First like

  • @mobilesoftware-Learning
    @mobilesoftware-Learning2 жыл бұрын

    Whatsapp me

  • @Ashishsurin0
    @Ashishsurin0 Жыл бұрын

    Sir your insta id??

Келесі