You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/generic-methodologies-and-resources/phishing-methodology/mobile-phishing-malicious-apps.md
+65Lines changed: 65 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -222,11 +222,76 @@ public void onMessageReceived(RemoteMessage msg){
222
222
223
223
---
224
224
225
+
## Socket.IO/WebSocket-based APK Smuggling + Fake Google Play Pages
226
+
227
+
Attackers increasingly replace static APK links with a Socket.IO/WebSocket channel embedded in Google Play–looking lures. This conceals the payload URL, bypasses URL/extension filters, and preserves a realistic install UX.
- No static APK URL is exposed; payload is reconstructed in memory from WebSocket frames.
253
+
- URL/MIME/extension filters that block direct .apk responses may miss binary data tunneled via WebSockets/Socket.IO.
254
+
- Crawlers and URL sandboxes that don’t execute WebSockets won’t retrieve the payload.
255
+
256
+
Hunting and detection ideas:
257
+
- Web/network telemetry: flag WebSocket sessions that transfer large binary chunks followed by creation of a Blob with MIME application/vnd.android.package-archive and a programmatic `<a download>` click. Look for client strings like socket.emit('startDownload'), and events named chunk, downloadProgress, downloadComplete in page scripts.
258
+
- Play-store spoof heuristics: on non-Google domains serving Play-like pages, hunt for Google Play UI strings such as http.html:"VfPpkd-jY41G-V67aGc", mixed-language templates, and fake “verification/progress” flows driven by WS events.
259
+
- Controls: block APK delivery from non-Google origins; enforce MIME/extension policies that include WebSocket traffic; preserve browser safe-download prompts.
260
+
261
+
See also WebSocket tradecraft and tooling:
262
+
263
+
{{#ref}}
264
+
../../pentesting-web/websocket-attacks.md
265
+
{{#endref}}
266
+
267
+
### Open-directory APK staging & rotation
268
+
269
+
Operators often keep multiple bank-themed loaders in browsable indexes for rapid rotation and reuse. This enables:
270
+
- Fast swapping of filenames/brands without code changes in lures.
271
+
- Seed lists for smishing/SEO lures that reference fresh filenames.
272
+
273
+
Hunting tips:
274
+
- Continuously scrape open indexes for APK filenames + hashes; diff over time to track rotations.
275
+
- Correlate APK families by reused signing certs, package names, hardcoded endpoints, and string kits.
276
+
277
+
### Infrastructure fingerprints for proactive blocking
278
+
279
+
Common recurring traits worth risk-scoring when observed together:
-[Android Malware Promises Energy Subsidy to Steal Financial Data (McAfee Labs)](https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-promises-energy-subsidy-to-steal-financial-data/)
-[Banker Trojan Targeting Indonesian and Vietnamese Android Users (DomainTools)](https://dti.domaintools.com/banker-trojan-targeting-indonesian-and-vietnamese-android-users/)
0 commit comments