@@ -264,24 +264,6 @@ See also WebSocket tradecraft and tooling:
264264../../pentesting-web/websocket-attacks.md
265265{{#endref}}
266266
267- ### Open-directory APK staging & rotation
268-
269- Operators often keep multiple bank-themed loaders in browsable indexes for rapid rotation and reuse. This enables:
270- - Fast swapping of filenames/brands without code changes in lures.
271- - Seed lists for smishing/SEO lures that reference fresh filenames.
272-
273- Hunting tips:
274- - Continuously scrape open indexes for APK filenames + hashes; diff over time to track rotations.
275- - Correlate APK families by reused signing certs, package names, hardcoded endpoints, and string kits.
276-
277- ### Infrastructure fingerprints for proactive blocking
278-
279- Common recurring traits worth risk-scoring when observed together:
280- - Hosting: Alibaba, Scloud, Cloudflare fronting; geo often SG/ID; nginx servers.
281- - Registrar/NS: Gname.com Pte. Ltd.; nameservers like share-dns[ .] net; inexpensive/fast issuance CAs (e.g., R10, R11, WE1).
282- - Content: page titles like “Identitas Kependudukan Digital- Apps on Google Play”; short domain-registration→first-DNS resolution deltas (< 12h) indicating quick operationalization.
283-
284-
285267
286268## References
287269
@@ -294,4 +276,4 @@ Common recurring traits worth risk-scoring when observed together:
294276- [ DomainTools SecuritySnacks – ID/VN Banker Trojans (IOCs)] ( https://github.com/DomainTools/SecuritySnacks/blob/main/2025/BankerTrojan-ID-VN )
295277- [ Socket.IO] ( https://socket.io )
296278
297- {{#include ../../banners/hacktricks-training.md}}
279+ {{#include ../../banners/hacktricks-training.md}}
0 commit comments