Shindan blog

Operation triangulation - audio module analysis.

March 5, 2024

This blog post is the continuation of our series on Operation Triangulation. The first blog post can be found here : https://shindan.io/posts/keychain_module_analysis/

In this blogpost we will focus on the audio module : ff2f223542bbc243c1e7c6807e4c80ddad45005bcd78a77f8ec91de29deb2f6e

This module is in charge of recording the device microphone. It implements some tricks to hide itself which will be explained in this blog post. This module does not contain any symbols and uses some sort of obfuscation.

...

Hello Shindan

Greetings to all the cybersecurity enthusiasts, forensic analysts, and tech aficionados out there! Today, we make it public. We’ve been passionately working on for the past year: Shindan. In the ever-evolving world of mobile technology, where devices become increasingly sophisticated, the need for equally advanced forensic tools has never been more crucial. That’s where Shindan steps in. Mobile devices are treasure troves of data. They contain our personal messages, business emails, photos, location history, and so much more. ...