CERT South Korea Leaks New C&C Tool for Korean Android Stealer

Earlier today the source code behind a new C&C extractor for Android devices was leaked online by “JayK,” a Community Emergency Response Team (CERT) employee out of south Korea. The malware is said to be a tool for Korean Android Stealer, authored by Jacob Soo, which has the ability to extract asset files from C&C streams – including resources such as models, textures, sounds and music.

Briefly explained by “0x20k” aka urharmful of Ghost Squad Hackers, the tool essentially works by:

Image may contain: text

Leaked Source Code by JayK: https://ghostbin.com/paste/ojuoh

No automatic alt text available.

Image may contain: text

 

Published by

Brian Dunn

Writer, Researcher Owner: Rogue Media Labs | Rogue Security Labs (929)-319-2570 BrianDunn@RogueSecurityLabs.Ltd

Leave a Reply

Your email address will not be published.