#Obfuscation

2025-12-04

Секреты на клиенте: как снизить вероятность утечки с нуля до почти нуля

Мобильное приложение всегда оказывается на устройстве пользователя — а значит, потенциально доступ к нему может быть и у злоумышленника. Это значительно повышает требования к безопасности выпускаемых продуктов, поскольку в коде приложений неизбежно содержатся конфиденциальные данные, которые используются разработчиками. Соответственно, обязательным условием становится защита секретов на клиенте от утечек. Привет, Хабр. Меня зовут Кирилл Смирнов. Я руководитель разработки в iOS команде СберЗдоровья — MedTech компании №1 в России . В этой статье я расскажу, где в iOS -приложениях хранятся секреты и как их находят, почему важно скрывать секреты, и как выстроить надежную защиту с учетом потенциальных угроз. Материал подготовлен по мотивам моего доклада на Podlodka iOS Crew. Вы можете посмотреть его здесь .

habr.com/ru/companies/docdoc/a

#owasp #ios #stride #apple #jailbreak #sslpinning #encryption #obfuscation #swift #macros

2025-12-03

IVPN completes full V2Ray rollout across all supported platforms
technadu.com/ivpn-rolls-out-v2

• V2Ray now available on Windows/macOS/Linux/iOS/Android
• Supports VMESS/QUIC and VMESS/TCP
• Helps bypass censorship by masking WireGuard traffic
• Some performance trade-offs expected

Follow us for ongoing threat, privacy, and infrastructure coverage.

#IVPN #V2Ray #Obfuscation #WireGuard #Infosec #CensorshipBypass

IVPN Rolls Out V2Ray Obfuscation Across All Platforms
cryptaxcryptax
2025-11-25

Speakers often overrate the TLP they use on their slides.

I've just seen a standard slide (excellent one, but that's not the point) that explains what is.

It was marked TLP:GREEN, which means it should not be shared on public platforms, and why I'm not attaching it here.

In reality, it should have been rating TLP:CLEAR, because there absolutely nothing sensible on it.

I suspect people overrate category to make it sound like there's something "juicy" about a slide...

2025-11-20

@baskin αυτό δουλεύω κι εγώ εδώ και αρκετά χρόνια.

Ενδιαφέρον συνοδευτικό βιβλίο είναι και το obfuscation: a user's guide for privacy and protest, των Brunton και Nissenbaum

we.riseup.net/assets/355198/Ob

#obfuscation #adblock

:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉nemo@mas.to
2025-11-18

🚀 Mullvad VPN launches Lightweight WireGuard Obfuscation (LWO) to help users bypass firewalls & censorship with minimal overhead. Available now on desktop & Android, iOS coming soon! Enjoy faster, more private VPN connections. 🌐🔒 #VPN #Privacy #WireGuard #Obfuscation #newz

Read more: mullvad.net/de/blog/introducin

2025-11-08

GlassWorm malware is evolving—using invisible code tricks to sneak into GitHub, NPM, and beyond. Could your favorite dev tools be next in its global pursuit? Read more to find out.

thedefendopsdiaries.com/glassw

#glassworm
#malwarecampaign
#cybersecurity
#obfuscation
#vscodeextensions

WasteLand Origin :lattentacle:wlorigin
2025-10-29

Mojang заявили, что со следующего снапшота перестанут использовать обфускацию кода игры. Это означает, что моддинг игры упроститься.

WIST Quotationswist@my-place.social
2025-10-23

A quotation from Robert Louis Stevenson

The cruellest lies are often told in silence. A man may have sat in a room for hours and not opened his teeth, and yet come out of that room a disloyal friend or a vile calumniator.

Robert Louis Stevenson (1850-1894) Scottish essayist, novelist, poet
Essay (1879-05), “The Truth of Intercourse,” Cornhill Magazine, Vol. 39

More info about this quote: wist.info/stevenson-robert-lou…

#quote #quotes #quotation #qotd #robertlouisstevenson #betrayal #deceit #disloyalty #obfuscation #silence #speakout #speakup

Who Let The Dogs Out 🐾ashed@mastodon.ml
2025-10-23

Разбираем «Telega» по винтикам: «бесплатный» сыр только в мышеловке

#android #telega #obfuscation #malware

"Совы не то чем кажутся" (С)

«Telega» — это не просто очередной мессенджер. Это комбайн по сбору пользовательских данных для VK, который к тому же содержит в себе заготовки для цензуры, а его официальные заявления не выдерживают критики и опровергаются техническими фактами.

-- Приватность: Отсутствует как класс. Приложение собирает огромный пласт данных о ваших действиях и отправляет его в VK, привязав к вашему ID.

-- Безопасность: Функция «бесплатного прокси» является централизованной и полностью контролируемой владельцами. Использование этой функции равносильно добровольной передаче всего своего трафика третьим лицам.

-- Честность: Разработчики вводят пользователей в заблуждение относительно своей независимости от VK

habr.com/ru/articles/959534/

2025-10-17

TIL: Buying an ebook on amazon doesn't actually give you an ebook file. Instead, you are granted access to it from a crashing app.

blog.pixelmelt.dev/kindle-web-

#amazon #til #bigtech #kindle #obfuscation #ebook

2025-10-08

🚀 Introducing #r2morph , a metamorphic binary transformation engine built on @radareorg + #r2pipe.
It applies semantic mutations (NOPs, instruction swaps, dead code, opaque predicates…) without breaking functionality.

🧠 Perfect for research on evasion, obfuscation & malware analysis.

🔗 github.com/seifreed/r2morph

#malware #obfuscation #forensics #radare #radare2

2025-09-25

Xcode devs, beware: a new macOS malware variant is sneaking into projects by disguising itself as a trusted app—and even hijacking clipboard crypto transactions. Curious how it evades detection?

thedefendopsdiaries.com/xcsset

#xcsset
#macosmalware
#xcode
#supplychainattack
#cybersecurity
#malwareanalysis
#obfuscation
#cryptotheft
#browsersecurity

WIST Quotationswist@my-place.social
2025-09-25

A quotation from Talleyrand

Speech was given to man to conceal his thoughts.
 
[La parole a été donné à l’homme pour déguiser sa pensée.]

Charles-Maurice de Talleyrand-Périgord (1754-1838) French secularized clergyman, statesman, wit, diplomat
(Attributed)

More info about this quote: wist.info/talleyrand/79291/

#quote #quotes #quotation #qotd #talleyrand #communication #concealment #dissembling #doublespeak #equivocation #language #lying #miscommunication #obfuscation #speech #thought

2025-09-24

🦠 Malware Analysis
===================

🦠 Malware Analysis

Executive summary: Fake utility installers (including speedtest,
manual-reader/finder, PDF tools, and some AI frontends) have been
observed to bundle a portable Node runtime, extract an obfuscated
JavaScript payload, and install a Scheduled Task to execute that JS on
a recurring cycle. The JS speaks to a C2 (observed domain:
cloud.appusagestats[.]com), exfiltrates system identifiers and can
execute arbitrary commands returned by the server.

Technical details:
• The installers are packed with an Inno-Packer and drop a portable
Node runtime folder alongside the visible application executable.
• Persistence is implemented via a Scheduled Task (task.xml) that
executes the dropped node.exe with an obfuscated *.js script on an
approximate 12-hour cadence.
• The JavaScript is heavily obfuscated but decodes into JSON-formatted
POST payloads (e.g., a version string like "0.2.1" and a
JSON.stringify body). The script queries
HKLM\Software\Microsoft\Cryptography for MachineGuid via reg.exe to
uniquely identify hosts.
• The C2 interaction includes encoded/obfuscated POSTs and server
responses that can include commands such as powershell -NoPr... for
remote execution.

Impact and attack mechanics:
• The visible app functions normally, reducing suspicion while the
background agent provides persistent C2 connectivity and remote
execution capabilities.
• This separation increases attack surface: defenders may see only a
benign UI app while a persistent Node-based agent operates
independently.

Detection guidance:
• Search for Scheduled Tasks invoking node.exe outside known
development contexts.
• Detect unexpected portable Node runtimes co-located with third-party
installers.
• Monitor outbound POSTs to uncommon domains like
cloud.appusagestats[.]com and inspect request bodies for JSON
structures and Base64-encoded payloads.
• Track registry queries for
HKLM\Software\Microsoft\Cryptography\MachineGuid from non-standard
processes.

Mitigations:
• Block or alert on execution of portable runtimes from user-writable
directories.
• Restrict scheduled task creation to privileged installers; monitor
changes to task scheduler.
• Enforce egress filtering to limit access to suspicious domains and
use TLS inspection where policies allow.

References & notes:
• Observed artifacts: Inno-Packer installer, portable Node folder,
obfuscated *.js, task.xml, C2 domain cloud.appusagestats[.]com.

🔹 nodejs #powershell #scheduledtask #obfuscation #persistence

🔗 Source: security5magics.blogspot.com/2

2025-07-04

Only 5️⃣ more days until DIMVA‘25!

We kickstart the conference on Wednesday with our welcome event, exploring the old town of Graz during a city tour. See you there!

#DIMVA25 #Conference #WebSecurity #Vulnerability #VulnerabilityDetection #SideChannels #Obfuscation #OS #Network #AndroidPatches #AI #ML #ResilientSystems

2025-06-22

How can you define a word or expression to make it precise enough to be studied?

Instead of just defining it, you can "operationalize" it [1], or even better, operationalisationalisticalise it [2]. And then instead of using a method to study it, you can use a methodology [3], or even better, a methodologicalisationism [2].

It should be mentioned that the reader should note the above.

@academicchatter

#Obfuscation

[1] en.wiktionary.org/wiki/operati
[2] (neologisms)
[3] en.wiktionary.org/wiki/methodo

2025-06-16

"Votre adresse e-mail est utilisée pour l'envoi de ce message. Vous disposez de droits sur vos données personnelles, notamment le droit d'accès, de rectification, d'effacement, de limitation du traitement, de portabilité et d'opposition. Pour exercer ces droits, veuillez remplir notre widget prévu à cet effet sur notre site internet."

Et mettre un lien vers ce widget *dans le mail*, c'était trop compliqué, #HopitalEuropéen de #Marseille ?

#Obfuscation #DonnéesPersonnelles #Rétention #RGPD

Sam Bentdoingfedtime
2025-06-15

Use bandwidth throttling to avoid network traffic analysis.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst