Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-11-19ArmorbloxArjun Sambamoorthy
@online{sambamoorthy:20201119:ok:0fa952d, author = {Arjun Sambamoorthy}, title = {{OK Google, Build Me a Phishing Campaign}}, date = {2020-11-19}, organization = {Armorblox}, url = {https://www.armorblox.com/blog/ok-google-build-me-a-phishing-campaign/}, language = {English}, urldate = {2020-11-23} } OK Google, Build Me a Phishing Campaign
2020-11-17GoogleShane Huntley, Google Threat Analysis Group
@online{huntley:20201117:tag:74d7811, author = {Shane Huntley and Google Threat Analysis Group}, title = {{TAG Bulletin: Q4 2020}}, date = {2020-11-17}, organization = {Google}, url = {https://blog.google/threat-analysis-group/tag-bulletin-q4-2020/}, language = {English}, urldate = {2020-11-19} } TAG Bulletin: Q4 2020
2020-10-29Cisco TalosWarren Mercer, Paul Rascagnères, Vitor Ventura
@online{mercer:20201029:donots:850f31b, author = {Warren Mercer and Paul Rascagnères and Vitor Ventura}, title = {{DoNot’s Firestarter abuses Google Firebase Cloud Messaging to spread}}, date = {2020-10-29}, organization = {Cisco Talos}, url = {https://blog.talosintelligence.com/2020/10/donot-firestarter.html}, language = {English}, urldate = {2020-10-29} } DoNot’s Firestarter abuses Google Firebase Cloud Messaging to spread
Unidentified APK 005
2020-10-16GoogleShane Huntley, Google Threat Analysis Group
@online{huntley:20201016:how:baafd73, author = {Shane Huntley and Google Threat Analysis Group}, title = {{How we're tackling evolving online threats}}, date = {2020-10-16}, organization = {Google}, url = {https://blog.google/threat-analysis-group/how-were-tackling-evolving-online-threats}, language = {English}, urldate = {2020-10-23} } How we're tackling evolving online threats
2020-10-08BitdefenderOana Asoltanei, Elena Flondor, Alin Mihai Barbatei, Liviu Aarsene
@online{asoltanei:20201008:fake:88db68e, author = {Oana Asoltanei and Elena Flondor and Alin Mihai Barbatei and Liviu Aarsene}, title = {{Fake Users Rave but Real Users Rant as Apps on Google Play Deal Aggressive Adware}}, date = {2020-10-08}, organization = {Bitdefender}, url = {https://labs.bitdefender.com/2020/10/fake-users-rave-but-real-users-rant-as-apps-on-google-play-deal-aggressive-adware/}, language = {English}, urldate = {2020-10-12} } Fake Users Rave but Real Users Rant as Apps on Google Play Deal Aggressive Adware
2020-09-24BitdefenderAlexandra Bocereg, Oana Asoltanei, Ioan-Septimiu Dinulica, Bogdan Botezatu
@online{bocereg:20200924:apps:88b3497, author = {Alexandra Bocereg and Oana Asoltanei and Ioan-Septimiu Dinulica and Bogdan Botezatu}, title = {{Apps on Google Play Tainted with Cerberus Banker Malware}}, date = {2020-09-24}, organization = {Bitdefender}, url = {https://labs.bitdefender.com/2020/09/apps-on-google-play-tainted-with-cerberus-banker-malware/}, language = {English}, urldate = {2020-10-13} } Apps on Google Play Tainted with Cerberus Banker Malware
Cerberus
2020-07-22TrustwaveHomer Pacag
@online{pacag:20200722:lockscreen:e3c212d, author = {Homer Pacag}, title = {{Lockscreen Ransomware Phishing Leads To Google Play Card Scam}}, date = {2020-07-22}, organization = {Trustwave}, url = {https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/lockscreen-ransomware-phishing-leads-to-google-play-card-scam/}, language = {English}, urldate = {2020-07-30} } Lockscreen Ransomware Phishing Leads To Google Play Card Scam
lockscreen
2020-07-13BleepingComputerLawrence Abrams
@online{abrams:20200713:new:a9e2a62, author = {Lawrence Abrams}, title = {{New AgeLocker Ransomware uses Googler's utility to encrypt files}}, date = {2020-07-13}, organization = {BleepingComputer}, url = {https://www.bleepingcomputer.com/news/security/new-agelocker-ransomware-uses-googlers-utility-to-encrypt-files/}, language = {English}, urldate = {2020-07-15} } New AgeLocker Ransomware uses Googler's utility to encrypt files
2020-07-09CheckpointAviran Hazum, Bogdan Melnykov, Israel Wernik
@online{hazum:20200709:new:5e06825, author = {Aviran Hazum and Bogdan Melnykov and Israel Wernik}, title = {{New Joker variant hits Google Play with an old trick}}, date = {2020-07-09}, organization = {Checkpoint}, url = {https://research.checkpoint.com/2020/new-joker-variant-hits-google-play-with-an-old-trick/}, language = {English}, urldate = {2020-07-11} } New Joker variant hits Google Play with an old trick
Joker
2020-06-22Kaspersky LabsVictoria Vlasova
@online{vlasova:20200622:web:4a9c89c, author = {Victoria Vlasova}, title = {{Web skimming with Google Analytics}}, date = {2020-06-22}, organization = {Kaspersky Labs}, url = {https://securelist.com/web-skimming-with-google-analytics/97414/}, language = {English}, urldate = {2020-06-24} } Web skimming with Google Analytics
2020-06-05Trend MicroFord Qin
@online{qin:20200605:new:7251449, author = {Ford Qin}, title = {{New Tekya Ad Fraud Found on Google Play}}, date = {2020-06-05}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/new-tekya-ad-fraud-found-on-google-play/}, language = {English}, urldate = {2020-06-10} } New Tekya Ad Fraud Found on Google Play
2020-05-07BitdefenderBitdefender Team
@online{team:20200507:gogoogle:d6b8c14, author = {Bitdefender Team}, title = {{GoGoogle Decryption Tool}}, date = {2020-05-07}, organization = {Bitdefender}, url = {https://labs.bitdefender.com/2020/05/gogoogle-decryption-tool/}, language = {English}, urldate = {2020-07-07} } GoGoogle Decryption Tool
GoGoogle
2020-01-09GoogleAlec Guertin, Vadim Kotov
@online{guertin:20200109:pha:deb82eb, author = {Alec Guertin and Vadim Kotov}, title = {{PHA Family Highlights: Bread (and Friends)}}, date = {2020-01-09}, organization = {Google}, url = {https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html}, language = {English}, urldate = {2020-01-20} } PHA Family Highlights: Bread (and Friends)
Joker
2020-01-06Trend MicroEcular Xu, Joseph C Chen
@online{xu:20200106:first:bb9628c, author = {Ecular Xu and Joseph C Chen}, title = {{First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group}}, date = {2020-01-06}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/}, language = {English}, urldate = {2020-01-13} } First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group
SideWinder
2019-10-02tcontre
@online{tcontre:20191002:dcrat:1d1f601, author = {tcontre}, title = {{DCRAT malware Evades SandBox that use Fake Internet by using the Google public DNS IP address}}, date = {2019-10-02}, url = {https://tccontre.blogspot.com/2019/10/dcrat-malware-evades-sandbox-that-use.html}, language = {English}, urldate = {2020-02-13} } DCRAT malware Evades SandBox that use Fake Internet by using the Google public DNS IP address
DCRat
2019-09-06ProofpointProofpoint Threat Insight Team
@online{team:20190906:psixbot:7f87948, author = {Proofpoint Threat Insight Team}, title = {{PsiXBot Now Using Google DNS over HTTPS and Possible New Sexploitation Module}}, date = {2019-09-06}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/psixbot-now-using-google-dns-over-https-and-possible-new-sexploitation-module}, language = {English}, urldate = {2019-12-20} } PsiXBot Now Using Google DNS over HTTPS and Possible New Sexploitation Module
PsiX
2019-09-03Medium CSIS TechblogAleksejs Kuprins
@online{kuprins:20190903:analysis:2b5a874, author = {Aleksejs Kuprins}, title = {{Analysis of Joker — A Spy & Premium Subscription Bot on GooglePlay}}, date = {2019-09-03}, organization = {Medium CSIS Techblog}, url = {https://medium.com/csis-techblog/analysis-of-joker-a-spy-premium-subscription-bot-on-googleplay-9ad24f044451}, language = {English}, urldate = {2020-01-06} } Analysis of Joker — A Spy & Premium Subscription Bot on GooglePlay
Joker
2019-08-29GoogleIan Beer, Project Zero
@online{beer:20190829:implant:f25a696, author = {Ian Beer and Project Zero}, title = {{Implant Teardown}}, date = {2019-08-29}, organization = {Google}, url = {https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html}, language = {English}, urldate = {2020-01-06} } Implant Teardown
PoisonCarp
2019-08-22ESET ResearchLukáš Štefanko
@online{tefanko:20190822:firstofitskind:dc938ad, author = {Lukáš Štefanko}, title = {{First‑of‑its‑kind spyware sneaks into Google Play}}, date = {2019-08-22}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2019/08/22/first-spyware-android-ahmyth-google-play/}, language = {English}, urldate = {2019-11-14} } First‑of‑its‑kind spyware sneaks into Google Play
AhMyth
2019-08-07McAfeeChanung Pak, Yukihiro Okutomi
@online{pak:20190807:moqhao:9a44d6c, author = {Chanung Pak and Yukihiro Okutomi}, title = {{MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play}}, date = {2019-08-07}, organization = {McAfee}, url = {https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play/}, language = {English}, urldate = {2020-01-08} } MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play
SmsAgent