Coder friends. I have a question. How could a malicious actor compromise a google play store app on someone's phone without them knowingly downloading another file or clicking another link, e.g., the app was compromised such that within the app a webbrowser overlay is injected essentially intercepting interaction with the device so they aren't really using the app but interacting with a webpage.

#asknostr nostr:nprofile1qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcppemhxue69uhkummn9ekx7mp0qqs8a474cw4lqmapcq8hr7res4nknar2ey34fsffk0k42cjsdyn7yqqhdnr9g #code #blackhat

Reply to this note

Please Login to reply.

Discussion

Beuhler? Anyone? FWIW I don't want to do this, I want to help someone not have this done to them again.

nostr:nevent1qvzqqqqqqypzqead4r35g5evh7p0peczguhzf3ufdc8pe93rt6kt42jtsctq2gt3qqs8x8pepkl7wdsyfqwpu9kvpahfwva6493vf06tytl5e8a7sk8myyg6jmrcx

The mentioned note isn't populating, can't see.

I’ll check it out. Thank you.

To be honest, I don't know. I also don't know how many devs on Nostr are really focused on or knowledgeable about Android cybersecurity.

Thank you, it's interesting that no other than nostr:nprofile1qyd8wumn8ghj7enjv4jkccte9eek7anzd96zu6r0wd6z7qgcwaehxw309ahx7um5wgh8xmmkvf5hgtngdaehgtcqypzdc8pdh8plh4a7ayjhan44903ulrzqhtmmv06xu4443gf3ca8sk0sz8qv even had a guess. I wonder if this scam is really well managed and still highly covert.

I don't think they can.

Maybe nostr:nprofile1qqstnr0dfn4w5grepk7t8sc5qp5jqzwnf3lejf7zs6p44xdhfqd9cgspzpmhxue69uhkummnw3ezumt0d5hszrnhwden5te0dehhxtnvdakz7qgawaehxw309ahx7um5wghxy6t5vdhkjmn9wgh8xmmrd9skctcnv0md0 can say more.

If an app loads remote content submitted by other users of the app, then attack surface for remote code execution vulnerabilities could be there. The most common example is instant messenger apps having zero-click exploits thanks to malicious attachments with payloads that the app automatically parses or loads.

These attacks are highly sophisticated (the ability to be able to do them is sold on bounty sites for millions of dollars) with the amount of targets usually being in the hundreds. It isn't a concern for most people and you are not a significant target.

This also depends on a malicious actor knowing who you are to send an attachment. For the attacks you're talking about, the device is compromised, not the app. All Apps need to be signed by the real developer to be an accepted update on the OS, it would need to have been a phishing app, the signing key of the real app compromised or the developer was intentionally malicious from the beginning.

For your example of attack, it wouldn't really be something typical of what someone would try to do with this, and it would show signs of compromise even if subtle. For example, if you're using a password manager to log into a service, why doesn't it recognize this fake web login page as a real one?

Native Apps look very different to web pages and webviews. With such kind of an attack they have a lot of access in different areas so there's no need