This publication presents a thorough forensic investigation of the banking malware known as Hook, shedding light on its intricate functionalities and …| www.sciencedirect.com
New ERMAC (2.0) Evades MFA to Steal Banking Credentials of Over 400 Android Apps, Android trojans continue to proliferate and evolve.| QuoIntelligence
According to Intel471, ERMAC, an Android banking trojan enables bad actors to determine when certain apps are launched and then overwrites the screen display to steal the user's credentials| malpedia.caad.fkie.fraunhofer.de
How to access TLP Amber reports and how to understand TLP Amber reports| help.silentpush.com
Explore the Silent Push blog for in-depth perspectives and innovative insights on threat intelligence security. Search by post type and category today.| Silent Push
Field names are searchable data categories used in SPQL, and Web Scanner searches. Scanned data is grouped into separate repositories, known as a data sources. There are 6 data sources available in SPQL, each with their own set of field names that you can use to search through the data contained within them.| help.silentpush.com
This blog will take you through how to enrich domains or IPs in Silent Push, understand each enrichment category and get the most out of the enrichment feature by outlining useful functions such as pivoting and API capability.| Silent Push - We Know First
Authored by Joshua Kamp (main author) and Alberto Segura. Summary Hook and ERMAC are Android based malware families that are both advertised by the actor named “DukeEugene”. Hook is the latest vari…| Fox-IT International blog