
Wenjun Hu
Articles
-
Jun 7, 2024 |
mdpi.com | Wenjun Hu |Kun Li |Wenhao Yin |Han Zhang
All articles published by MDPI are made immediately available worldwide under an open access license. No specialpermission is required to reuse all or part of the article published by MDPI, including figures and tables. Forarticles published under an open access Creative Common CC BY license, any part of the article may be reused withoutpermission provided that the original article is clearly cited. For more information, please refer tohttps://www.mdpi.com/openaccess.
-
Oct 6, 2023 |
unit42.paloaltonetworks.com | Lee Wei Yeong |Xingjiali Zhang |Yang Ji |Wenjun Hu
This post is also available in: 日本語 (Japanese)Executive SummaryOne of the biggest challenges we face in analyzing Android application package (APK) samples at scale is the diversity of Android platform versions that malware authors use. When trying to utilize static and dynamic analysis techniques in the malware detection space, the sheer variety of platform versions can feel overwhelming.
-
Jun 15, 2023 |
unit42.paloaltonetworks.com | Yang Ji |Wenjun Hu |Lee Wei Yeong |Xingjiali Zhang
Unit 42 researchers have observed a surge of malware written for the Android platform that is attempting to impersonate the popular ChatGPT application. These malware variants emerged along with the release by OpenAI of GPT-3.5, followed by GPT-4, infecting victims interested in using the ChatGPT tool. Here, we provide an in-depth analysis of two types of currently active malware clusters. The first cluster is a Meterpreter Trojan disguised as a "SuperGPT" app.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →