The ‘Godfather’ Android Trojan Uses Virtualization Technology to Hijack Banking and Cryptocurrency Applications

The 'Godfather' Android Trojan Uses Virtualization Technology to Hijack Banking and Cryptocurrency Applications

Zimperium zLabs has discovered a significant upgraded version of the “Godfather” Android Trojan, which utilizes device-side virtualization technology to hijack real banking and cryptocurrency applications. Unlike traditional fake interface overlays, this malware creates a sandbox environment on the victim’s device, running real applications and capturing user input in real-time. This technology enables complete account takeover … Read more

A Simple Note on Python Reverse Engineering

Introduction Over the past decade, a significant amount of malware has been written in interpreted programming languages (such as Python), with increasing numbers and effective evasion techniques. In daily work, there are processes that require analyzing malicious files based on frontline feedback to obtain relevant information. When manually reverse engineering, one inevitably encounters Python malicious … Read more

Identifying and Avoiding NOP Instructions in Disassembly

Identifying and Avoiding NOP Instructions in Disassembly

In the workplace, a significant amount of time and effort is spent analyzing NOP instructions, which has become a concern for reverse engineers and security responders. NOP instructions are a series of instructions that have no actual significance. Besides wasting time, I have found that some people are also shocked and excited by the NOP … Read more