March 5, 2024
This blog post is the continuation of our series on Operation Triangulation. The first blog post can be found here : https://shindan.io/posts/keychain_module_analysis/
In this blogpost we will focus on the audio module :
ff2f223542bbc243c1e7c6807e4c80ddad45005bcd78a77f8ec91de29deb2f6e
This module is in charge of recording the device microphone. It implements some tricks to hide itself which will be explained in this blog post. This module does not contain any symbols and uses some sort of obfuscation.
...February 7, 2024
Operation Triangulation is the name of an attack that has been targeting Kaspersky employees among others.
Kaspersky has published a lot of really interesting blogposts detailing the exploit chain and how they caught all the samples.
...Greetings to all the cybersecurity enthusiasts, forensic analysts, and tech aficionados out there!
Today, we make it public. We’ve been passionately working on for the past year: Shindan.
In the ever-evolving world of mobile technology, where devices become increasingly sophisticated, the need for equally advanced forensic tools has never been more crucial. That’s where Shindan steps in.
Mobile devices are treasure troves of data. They contain our personal messages, business emails, photos, location history, and so much more.
...