<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Android — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/android/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 02:16:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/android/feed.xml" rel="self" type="application/rss+xml"/><item><title>Apktool Path Traversal Vulnerability (CVE-2026-39973)</title><link>https://feed.craftedsignal.io/briefs/2026-04-apktool-path-traversal/</link><pubDate>Tue, 21 Apr 2026 02:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-apktool-path-traversal/</guid><description>A path traversal vulnerability in Apktool versions 3.0.0 and 3.0.1 allows a malicious APK file to write arbitrary files to the filesystem during decoding, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>Apktool, a tool used for reverse engineering Android APK files, is vulnerable to a path traversal issue in versions 3.0.0 and 3.0.1 (CVE-2026-39973). This vulnerability resides within the <code>brut/androlib/res/decoder/ResFileDecoder.java</code> component. A maliciously crafted APK can exploit this flaw during standard decoding (<code>apktool d</code>) to write arbitrary files to the filesystem. The vulnerability is a security regression introduced by commit e10a045 (PR #4041, December 12, 2025), which inadvertently removed the <code>BrutIO.sanitizePath()</code> call, a crucial safeguard against path traversal attacks. By embedding <code>../</code> sequences in the <code>resources.arsc</code> Type String Pool, attackers can bypass directory restrictions and write files to sensitive locations, such as <code>~/.ssh/config</code>, <code>~/.bashrc</code>, or Windows Startup folders, ultimately enabling remote code execution. Apktool version 3.0.2 addresses this vulnerability by reintroducing the <code>BrutIO.sanitizePath()</code> function in <code>ResFileDecoder.java</code>, effectively mitigating the path traversal risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Android APK file.</li>
<li>The attacker embeds <code>../</code> sequences within the <code>resources.arsc</code> Type String Pool of the APK.</li>
<li>A user attempts to decode the malicious APK file using a vulnerable version of Apktool (3.0.0 or 3.0.1) via the command <code>apktool d malicious.apk</code>.</li>
<li>During the decoding process, the <code>ResFileDecoder.java</code> component processes the <code>resources.arsc</code> file.</li>
<li>Due to the missing <code>BrutIO.sanitizePath()</code> call, the <code>../</code> sequences are not sanitized, allowing path traversal.</li>
<li>Apktool attempts to write a resource file to a location outside the intended output directory.</li>
<li>The resource file is written to an arbitrary location on the filesystem, potentially overwriting critical system files (e.g., <code>~/.bashrc</code>, <code>~/.ssh/config</code>).</li>
<li>If a file like <code>~/.bashrc</code> is overwritten, subsequent shell sessions execute malicious code, achieving remote code execution. If a Windows Startup folder is targeted, the code executes on the next reboot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to write arbitrary files to the filesystem of the machine running Apktool. This can lead to various malicious outcomes, including remote code execution, privilege escalation, and data exfiltration. The impact is particularly severe if Apktool is run with elevated privileges or if sensitive files are overwritten. While specific victim numbers are not available, developers and security researchers who rely on Apktool for APK analysis are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Apktool version 3.0.2 or later to remediate CVE-2026-39973.</li>
<li>Implement file integrity monitoring on sensitive files like <code>~/.bashrc</code> and <code>~/.ssh/config</code> to detect unauthorized modifications.</li>
<li>Enable process monitoring to detect the execution of <code>apktool d</code> with suspicious arguments, particularly targeting unexpected output directories.</li>
<li>Deploy the Sigma rule &ldquo;Detect Apktool Path Traversal Attempt&rdquo; to identify potential exploitation attempts based on command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>apktool</category><category>path-traversal</category><category>android</category><category>cve-2026-39973</category></item><item><title>Mirax RAT Targeting Android Users in Europe</title><link>https://feed.craftedsignal.io/briefs/2026-04-mirax-rat/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mirax-rat/</guid><description>Mirax RAT, a new Android RAT distributed as MaaS, is targeting European users by turning infected devices into residential proxy nodes and enabling credential theft via overlay and notification injection.</description><content:encoded><![CDATA[<p>The Mirax RAT is a newly identified Android Remote Access Trojan (RAT) that has been actively targeting users in Europe since March 2026. It&rsquo;s offered as Malware-as-a-Service (MaaS) to a small group of affiliates, primarily Russian-speaking actors, through tiered subscription models. Since December 2025, Mirax has been promoted on underground forums and used in multiple campaigns. The RAT&rsquo;s distribution relies on malicious advertisements on Meta platforms like Facebook, Instagram, and Messenger, with over 200,000 users potentially exposed to these ads. The malware uses dropper pages hosted on GitHub and relies on APK sideloading for execution, bypassing the Google Play Store&rsquo;s security measures. Mirax&rsquo;s capabilities extend beyond typical RAT functions, including turning infected devices into residential proxy nodes via a SOCKS5 proxy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates malicious ads on Facebook, Instagram, and Messenger promoting IPTV application services.</li>
<li>Users click on the advertisements, which redirect them to dropper pages hosted on GitHub.</li>
<li>The user is prompted to enable installation from unknown sources on their Android device.</li>
<li>The malicious IPTV application is installed via APK sideloading.</li>
<li>The application initiates a multi-stage infection process, utilizing Golden Encryption (Golden Crypt) to pack the payload.</li>
<li>The payload, an encrypted Dalvik Executable (.dex) file, is decrypted during installation using the RC4 stream cipher with a hardcoded key.</li>
<li>Mirax gains control of the device, enabling overlay and notification injection for credential theft.</li>
<li>Attackers can view the screen in real-time, navigate and control the device, manage applications, exfiltrate images and text, and launch a SOCKS5 proxy connection to proxy traffic through the infected device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mirax RAT campaign has the potential to affect a large number of Android users in Europe. The malicious advertisements have already reached over 200,000 users. Successful infections can lead to credential theft, financial fraud, data exfiltration, and the compromised device being used as a residential proxy, potentially masking malicious activity and further expanding the attacker&rsquo;s reach. Banks and financial institutions are specifically highlighted as high-value targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to GitHub domains associated with APK downloads, and correlate that with android device user agents (Network Connection and User Agent logs).</li>
<li>Implement detections for process creation events related to sideloaded APK installations, specifically looking for unusual parent-child process relationships (Process Creation Logs).</li>
<li>Deploy the Sigma rule provided below to detect the execution of applications from untrusted sources and tune for your environment.</li>
<li>Monitor network connections for SOCKS5 proxy traffic originating from Android devices, which may indicate compromised devices acting as residential proxies (Network Connection Logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>android</category><category>rat</category><category>mirax</category><category>malware-as-a-service</category><category>proxy</category></item><item><title>OpenClaw WebView JavascriptInterface Vulnerability (CVE-2026-35643)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-webview-rce/</link><pubDate>Fri, 10 Apr 2026 17:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-webview-rce/</guid><description>OpenClaw before 2026.3.22 is vulnerable to arbitrary code execution due to an unvalidated WebView JavascriptInterface, allowing attackers to inject malicious instructions by invoking the canvas bridge from untrusted pages.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.22 are susceptible to a critical vulnerability (CVE-2026-35643) stemming from an unvalidated WebView JavascriptInterface. This flaw enables attackers to inject arbitrary instructions and execute malicious code within the context of the Android application. The vulnerability arises because untrusted web pages can exploit the canvas bridge, a component responsible for communication between the WebView and the native Android code. Successful exploitation allows an attacker to gain control over the application&rsquo;s resources and potentially the device itself. This is a severe risk for any application using OpenClaw, as it could lead to data theft, malware installation, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application utilizing a vulnerable version of OpenClaw (prior to 2026.3.22).</li>
<li>The attacker crafts a malicious web page containing JavaScript code designed to exploit the unvalidated WebView JavascriptInterface.</li>
<li>The victim unknowingly navigates to the attacker-controlled web page, likely through social engineering or malicious advertising.</li>
<li>The malicious JavaScript code on the page interacts with the vulnerable canvas bridge within the OpenClaw WebView.</li>
<li>The attacker injects arbitrary instructions through the canvas bridge, leveraging the lack of input validation.</li>
<li>These injected instructions are then executed within the Android application context, bypassing security restrictions.</li>
<li>The attacker gains unauthorized access to the application&rsquo;s resources, such as user data or device functionalities.</li>
<li>The attacker executes arbitrary code, potentially leading to data exfiltration, malware installation, or complete device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of CVE-2026-35643 in OpenClaw can lead to complete compromise of the Android application and potentially the device it is running on. This can result in data theft, unauthorized access to sensitive information, installation of malware, and other malicious activities. While the exact number of vulnerable applications is unknown, the widespread use of OpenClaw could potentially affect a large number of users. The vulnerability is particularly dangerous because it can be exploited remotely through a simple web page, making it easily accessible to attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.22 or later to patch CVE-2026-35643, as mentioned in the overview.</li>
<li>Implement input validation and sanitization on all data received through the WebView JavascriptInterface to prevent arbitrary code injection.</li>
<li>Deploy the Sigma rule to detect attempts to exploit the canvas bridge within OpenClaw (see &ldquo;Detect Suspicious WebView Bridge Usage&rdquo; rule).</li>
<li>Monitor web traffic for access to untrusted URLs from applications utilizing OpenClaw to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35643</category><category>rce</category><category>android</category></item><item><title>Android-ImageMagick7 Memory Leak Vulnerability (CVE-2026-33852)</title><link>https://feed.craftedsignal.io/briefs/2026-03-android-imagemagick-memory-leak/</link><pubDate>Tue, 24 Mar 2026 07:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-android-imagemagick-memory-leak/</guid><description>A missing release of memory vulnerability (CVE-2026-33852) in MolotovCherry Android-ImageMagick7 before version 7.1.2-11 can lead to a denial-of-service condition due to memory exhaustion.</description><content:encoded><![CDATA[<p>CVE-2026-33852 is a &ldquo;Missing Release of Memory after Effective Lifetime&rdquo; vulnerability affecting MolotovCherry Android-ImageMagick7 versions prior to 7.1.2-11. Discovered by the Government Technology Agency of Singapore Cyber Security Group (GovTech CSG), this memory leak can occur when processing specially crafted image files. An attacker could potentially exploit this vulnerability to cause a denial-of-service condition on a vulnerable Android device by repeatedly triggering the memory leak…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>memory leak</category><category>denial of service</category><category>android</category></item><item><title>Android-ImageMagick7 Out-of-Bounds Write Vulnerability (CVE-2026-33854)</title><link>https://feed.craftedsignal.io/briefs/2026-03-android-imagemagick-oob-write/</link><pubDate>Tue, 24 Mar 2026 06:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-android-imagemagick-oob-write/</guid><description>An unauthenticated, remote attacker can exploit an out-of-bounds write vulnerability (CVE-2026-33854) in MolotovCherry Android-ImageMagick7 versions before 7.1.2-10 by enticing a user to open a malicious image, potentially leading to arbitrary code execution.</description><content:encoded>&lt;p>CVE-2026-33854 is an out-of-bounds write vulnerability affecting MolotovCherry Android-ImageMagick7 versions prior to 7.1.2-10.  This vulnerability stems from improper bounds checking within the image processing logic. The Government Technology Agency of Singapore Cyber Security Group (GovTech CSG) reported this vulnerability. Successful exploitation could lead to a denial of service, information disclosure, or potentially arbitrary code execution on the affected device. Due to the widespread…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>out-of-bounds write</category><category>android</category><category>imagemagick</category></item><item><title>EquityPandit 1.0 Insecure Logging Vulnerability (CVE-2019-25605)</title><link>https://feed.craftedsignal.io/briefs/2026-03-equitypandit-logging/</link><pubDate>Mon, 23 Mar 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-equitypandit-logging/</guid><description>EquityPandit 1.0 contains an insecure logging vulnerability (CVE-2019-25605) that allows attackers to capture sensitive user credentials by accessing developer console logs via Android Debug Bridge, specifically exposing plaintext passwords during the forgot password function.</description><content:encoded>&lt;p>EquityPandit 1.0, an Android application, is vulnerable to insecure logging practices. Specifically, the application logs sensitive user credentials, including plaintext passwords, within the developer console logs. This vulnerability, identified as CVE-2019-25605, allows an attacker with access to the device or ADB (Android Debug Bridge) to extract these credentials. The vulnerability was reported in 2019, but publicly disclosed details and exploits surfaced more recently. Successful…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>insecure-logging</category><category>credential-access</category><category>android</category></item><item><title>Maltrail IOC Feed Update for Multiple Threats</title><link>https://feed.craftedsignal.io/briefs/2026-03-maltrail-iocs/</link><pubDate>Sun, 15 Mar 2026 21:00:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-maltrail-iocs/</guid><description>This brief summarizes IOCs extracted from the Maltrail feed on March 15, 2026, covering domains and URLs associated with threats targeting macOS and Android platforms, including OSX_Atomic, FakeApp, Android_Joker, Lummack2, APT_Sidewinder, APT_Kimsuky, and Hak5Cloud_C2.</description><content:encoded><![CDATA[<p>This threat brief highlights indicators of compromise (IOCs) identified on March 15, 2026, through the Maltrail feed. The identified IOCs are associated with a variety of threat actors and malware families, targeting both macOS and Android operating systems. The threats include OSX_Atomic, which potentially delivers malware to macOS systems; FakeApp, used for deceptive applications; Android_Joker, a known Android malware family; Lummack2, an information stealer; APT_Sidewinder, an advanced persistent threat actor; APT_Kimsuky, another APT group; and Hak5Cloud_C2, related to Hak5 Cloud Command and Control infrastructure. This diverse set of IOCs underscores the wide range of threats organizations face and the importance of monitoring network traffic and system logs for malicious activity. This data is crucial for detection engineers to build and deploy relevant detection rules to protect their environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (OSX_Atomic/FakeApp):</strong> User downloads a seemingly legitimate application from a compromised website (e.g., <code>appsformacs.com</code>, <code>torrents4mac.com</code>, or a FakeApp site like <code>adhushapp-razvd.com</code>).</li>
<li><strong>Execution (OSX_Atomic/FakeApp):</strong> The downloaded application is executed on the user&rsquo;s macOS or Android device. This may involve bypassing security warnings or exploiting vulnerabilities.</li>
<li><strong>Persistence (OSX_Atomic/Android_Joker):</strong> The malware establishes persistence on the system, potentially using techniques such as modifying startup items or scheduled tasks (OSX_Atomic), or registering as a background service (Android_Joker).</li>
<li><strong>Command and Control (Multiple):</strong> The malware connects to a command-and-control (C2) server (e.g., <code>c2.socops.net</code>, <code>onev.online</code>) to receive instructions and exfiltrate data.</li>
<li><strong>Credential Theft (Lummack2):</strong> The malware attempts to steal credentials stored on the system or in web browsers, potentially using keylogging or form grabbing techniques (Lummack2).  Observed communicating with <code>police-center.vg</code>.</li>
<li><strong>Data Exfiltration (Multiple):</strong> Sensitive data, such as credentials, financial information, or personal data, is exfiltrated to the C2 server.</li>
<li><strong>Lateral Movement (APT_Sidewinder/APT_Kimsuky):</strong> The attacker uses the compromised system to move laterally within the network, targeting other systems and data.  APT_Sidewinder uses domains like <code>visa.nadra.gov-pk.info</code> while APT_Kimsuky leverages <code>naver.liferod.com</code> for potential C2 or phishing activities.</li>
<li><strong>Impact (Multiple):</strong> The attacker achieves their objectives, which may include financial gain (through fraud or extortion), intellectual property theft, or espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The identified IOCs represent a diverse range of threats that can have significant impact on organizations and individuals. Successful attacks can lead to financial losses due to fraud or ransomware, data breaches resulting in the theft of sensitive information, and reputational damage. The targeting of macOS and Android devices indicates a broad scope of potential victims, encompassing both corporate and personal devices. The involvement of APT groups like APT_Sidewinder and APT_Kimsuky suggests potential for targeted attacks with significant impact on national security or critical infrastructure. A single successful infection can lead to widespread compromise within an organization&rsquo;s network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block the malicious domains listed in the IOC table at the DNS resolver and firewall to prevent communication with known C2 infrastructure.</li>
<li>Implement a network intrusion detection system (NIDS) rule to detect connections to the malicious domains and URLs (IOCs) to identify potentially compromised systems.</li>
<li>Deploy the Sigma rules provided below to your SIEM and tune them for your specific environment to detect suspicious process execution and network connections.</li>
<li>Investigate systems communicating with any of the listed IOCs (domains/URLs) for signs of malware infection or unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>maltrail</category><category>ioc</category><category>osx</category><category>android</category><category>apt</category></item></channel></rss>