A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Jimmy Shah – Mobile App Moolah: Profit taking with Mobile Malware Derbycon 2011 (Hacking Illustrated Series InfoSec Tutorial Videos)

Jimmy Shah – Mobile App Moolah: Profit taking with Mobile Malware
Derbycon 2011

Smartphones are a hot new market for software developers. Millions of potential customers, and a large percentage willing to part with a small sum of money for your latest creation. Even a moderately successful app can help fill your pockets. It’s hard to ignore for legitimate developers. It’s even harder to ignore for criminals. Things have changed from the old days of malware creation. It’s no longer just about proving yourself or testing a new platform by writing proof-of-concepts(PoCs), porting old malware, and learning the idiosyncrasies of the development tools. Now it’s about evading detection and taking a profit. Where there’s money, crime usually follows. The presentation is not about attribution, naming names or pointing out the parties responsible. It’s about the underlying technology and the methods used, including: - how actual examples in the wild function - detection/analysis evasion techniques - geographical trends in profit-taking malware

Back to Derbycon 2011 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast