CERT South Korea Leaks New C&C Tool for Korean Android Stealer

Earlier today the source code behind a new C&C extractor for Android devices was leaked online by “JayK,” a Community Emergency Response Team (CERT) employee out of south Korea. The malware is said to be a tool for Korean Android Stealer, authored by Jacob Soo, which has the ability to extract asset files from C&C streams – including resources such as models, textures, sounds and music.

Briefly explained by “0x20k” aka urharmful of Ghost Squad Hackers, the tool essentially works by:

Image may contain: text

Leaked Source Code by JayK: https://ghostbin.com/paste/ojuoh

No automatic alt text available.

Image may contain: text


Categories: Hacking News

Tags: , , , , , , ,

Leave a Reply

Your email address will not be published.

Do NOT follow this link or you will be banned from the site!
%d bloggers like this: