Snowblind Abuses Android seccomp Sandbox To Bypass Security Mechanisms

A new Android banking trojan named Snowblind was discovered that exploits the Linux kernel feature seccomp, traditionally used for security, which installs a seccomp filter to intercept system calls and bypasses anti-tampering mechanisms in apps, even those with strong obfuscation and integrity checks.  The novel attack vector allows the malware to steal login credentials, bypass […]

The post Snowblind Abuses Android seccomp Sandbox To Bypass Security Mechanisms appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

This article has been indexed from GBHackers on Security | #1 Globally Trusted Cyber Security News Platform

Read the original article: