Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
In a recent development on June 28th, researchers made an interesting discovery regarding Android APK analysis. They noticed that Joe Sandbox had introduced an Android APK that posed challenges for most anti-decompilation tools. This APK was designed in such a way that it could not be effectively analyzed, and was installable on Android devices operating on an OS version higher than Android 9 Pie (API 28).
While this technique might appear novel, it’s worth noting that a similar approach was demonstrated back in 2014. Researchers had then shown how the compression algorithm employed within an APK could be manipulated to evade automatic script analysis and hinder static analysis.
“However, Android’s APK, which uses the ZIP format, supports only two compression methods. One is without any compression, i.e. the STORED method (0x0000), and the other is the DEFLATE (0x0008) compression algorithm. Depending on the Android version, the default behavior for unknown or unsupported methods differs”, the report added.
The report also elaborates on the compression methods used in Android’s APK, explaining that it supports only two primary methods: STORED and DEFLATE. The behavior of the system varies based on the Android version when encountering unknown or unsupported methods:
On versions below Android 9, applications that use unsupported or unknown compression methods are not installable, but they function correctly on versions above this.
The experts embarked on a retrohunt through public application repositories and unearthed approximately 3,300 artifacts employing these particular compression algorithms. While most of these samples were too corrupted for the operating system to load, a subset of 71 malicious samples could be properly loaded by the Android OS.
An intriguing aspect is that the researchers could not find any indication that these apps were available on the Google Play Store. This suggests a possible distribution through third-party stores or the exploitation of social engineering tactics to manipulate victims into installing them.
Moreover, they also detected additional techniques used to obfuscate the APK files and thwart analysis tools. These included strategies like employing filenames with excessive length (more than 256 bytes), incorporating malformed AndroidManifest.xml files, and introducing a Malformed String Pool.
In conclusion, this revelation sheds light on a sophisticated evasion technique that adversaries can leverage to evade analysis of their malicious APKs. The combination of using specific compression methods and employing various obfuscation tactics serves as a reminder of the evolving challenges in the realm of mobile app security and analysis.
http://shone.endeavour31.alpansa.ru/DESKTOP-3VASB0N/falcon/family.n64