Resources

CVE-2018-4087 PoC: Escaping the sandbox by misleading bluetoothd

Following my previous blog post titled “New Crucial Vulnerabilities in Apple’s bluetoothd daemon”, I am releasing the vulnerability PoC. The PoC is released for educational purposes and evaluation by IT Administrators and Pentesters alike, and should not be used in any unintended way. Furthermore, this PoC and any other related […]

Read more

Hey you, get off that cloud! Said no Zimperium person ever…

Zimperium Delivers First Mobile Security Solution Available On Any Cloud. Zimperium is proud to be the global leader in enterprise mobile security. We got there by one simple rule: listen to your customer. Our customers told us they didn’t want to be locked-in to any one cloud platform. They often […]

Read more

Don’t be caught on the wrong side of an attack

Using only cloud sourcing as the basis for mobile threat defense is the wrong side of an attack. We respect the boldness of a competitor’s CEO taking on the leader in his market. In a very literal sense, he laid his and his company’s cards on the table. This is […]

Read more

Zimperium Recognized in 2018 Cybersecurity Excellence Awards

The 2018 Cybersecurity Excellence Awards recently recognized Zimperium Mobile Threat Defense as the silver winner in the “Best Mobile Security Product” category. The 2018 Cybersecurity Excellence Awards are highly competitive. There were 400 entries in more than 70 categories. All of the winners and finalists reflect the very best in today’s […]

Read more

Dissecting mobile native code packers. A case study.

As mobile malware advances to the levels of desktop malware, it’s not uncommon to stumble upon protected APKs while analysing malware. Most of the times, the sample is simply obfuscated via classes/variables name stripping from the DEX file and/or strings obfuscation; but other times several layers divide the researcher from […]

Read more

New Crucial Vulnerabilities in Apple’s bluetoothd daemon

By: Rani Idan Follow Rani Idan (@raniXCH) As part of our platform research team in Zimperium zLabs, we investigated iOS mach message IPC, focusing on available services accessible from within the iOS sandbox. The goal of this effort was to assess potential opportunities to gain privilege escalation and escape the sandbox, […]

Read more

Threat Advisory: Skygofree

Skygofree, another in the long line of Android based spyware, is being touted as one of the most advanced targeted surveillance tools ever seen on mobile devices. Skygofree is designed to enable surveillance and full device control by remote attackers. On unprotected mobile devices, Skygofree allows attackers to perform advanced […]

Read more

Threat Advisory: Meltdown & Spectre

According to the team at Graz University of Technology that responsibly disclosed the new bugs, Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other […]

Read more

BankBot & Friends: Phishing Mobile Customers Like You Soon

Back in April of 2017, researchers discovered a new form of Android-targeting malware using fake overlay screens to mimic existing banking apps and steal user credentials. Distributed as benign apps in Google Play, BankBot-infected apps were posing as 20 entertainment and mobile banking apps. This first version of BankBot targeted a small […]

Read more