📢 Drifter : nouveau botnet DDoS ciblant les Android TV via ADB, capable de 2,6 Tbps
📝 ## 🔍 Contexte

Publié le 28 mars 2026 par la **Nokia Deepfield Emergency Response Team (ERT)**, ce rapport documente **Drifter**, un botnet DD...
📖 cyberveille : https://cyberveille.ch/posts/2026-03-30-drifter-nouveau-botnet-ddos-ciblant-les-android-tv-via-adb-capable-de-26-tbps/
🌐 source : https://github.com/deepfield/public-research/blob/main/drifter/report.md
#ADB #Android_TV #Cyberveille

Drifter : nouveau botnet DDoS ciblant les Android TV via ADB, capable de 2,6 Tbps

🔍 Contexte Publié le 28 mars 2026 par la Nokia Deepfield Emergency Response Team (ERT), ce rapport documente Drifter, un botnet DDoS jusqu’alors inconnu. Il s’inscrit dans une série de recherches sur l’écosystème de botnets exploitant la surface d’attaque ADB (Android Debug Bridge) sur des appareils Android TV non certifiés. 🎯 Vecteur d’infection et cibles Drifter cible les appareils Android TV AOSP bon marché exposant ADB sans authentification, la même population de dispositifs que MossadProxy v2.5.2, Jackskid et Kimwolf. Le dropper installe l’APK sous le nom com.siliconworks.android.update, accorde des permissions runtime, se met en liste blanche de l’optimisation batterie, et se relance toutes les 60 secondes via un BootReceiver (priorité 999).

CyberVeille

📢 Failles critiques dans les motos électriques Zero : firmware signable et authentification contournable
📝 ## 🔍 Contexte

Article publié le 29 mars 2026 sur le blog personnel de la chercheuse Persephone Karnstein, adapté d'une...
📖 cyberveille : https://cyberveille.ch/posts/2026-03-29-failles-critiques-dans-les-motos-electriques-zero-firmware-signable-et-authentification-contournable/
🌐 source : https://persephonekarnstein.github.io/post/zero-days/
#ADB #Android #Cyberveille

Failles critiques dans les motos électriques Zero : firmware signable et authentification contournable

🔍 Contexte Article publié le 29 mars 2026 sur le blog personnel de la chercheuse Persephone Karnstein, adapté d’une présentation donnée avec Mitchell Marasch à BSides Seattle 2026, pour le compte de Bureau Veritas Cybersecurity North America (anciennement Security Innovation). L’évaluation a été conduite fin 2025 / début 2026. 🎯 Périmètre de l’évaluation Les chercheurs ont évalué trois surfaces d’attaque : Le hardware physique (PCB/MBB de la moto Zero Motorcycles) L’application Android com.zeromotorcycles.nextgen Le firmware embarqué distribué via OTA (Over-The-Air) 🔓 Vulnérabilités identifiées 1. Secrets hardcodés dans l’application Android L’analyse de l’APK via JADX révèle dans com.zeromotorcycles.nextgen.BuildConfig :

CyberVeille

At my wits end

Does anyone know why wireless ADB immediately breaks on Pixels after a previously paired device tries to reconnect? Shows up on Shizuku, wireless terminal, etc.


#Android #adb #shizuku #duckduckfedi

FreeDroidWarn

Developer verification will be enforced on certified devices with Google Play Services installed, which is the majority of Android devices. There are options to bypass the restriction:

GitHub - woheller69/FreeDroidWarn · GitHub
https://github.com/woheller69/FreeDroidWarn?tab=readme-ov-file#solutions

#KeepAndroidOpen #Android #ADB

Купить дорого или выжать максимум из китайского проектора HY-300 через ADB и реверс-инжиниринг прошивки

Купил портативный проектор HY-300 — оказался не самым "ярким" представителем. Через ADB и root добрался до прошивки, нашёл скрипт testgamma, который при каждой загрузке занижает яркость до 70%. Разобрался как работает gamma LUT в видеопроцессоре VOP, какие параметры реально влияют на картинку, а какие — пустышки. Пошаговая инструкция по выжиманию максимума из проектора.

https://habr.com/ru/articles/1013176/

#HY300 #проектор #Rockchip #RK3326 #ADB #gamma_LUT #яркость #Android_TV #reverse_engineering #testgamma

Купить дорого или выжать максимум из китайского проектора HY-300 через ADB и реверс-инжиниринг прошивки

Дисклеймер: Под названием HY-300 продаётся множество внешне похожих проекторов от разных производителей — с разными SoC, прошивками и аппаратными решениями. Всё описанное ниже относится к конкретному...

Хабр

Несколько мобильных приложений в одном Appium‑проекте: как это можно организовать

Как тестировать несколько мобильных приложений в одном «Appium‑проекте». Показываю архитектуру фреймворка, запуск тестов через аннотации, потокобезопасный контекст и подключение новых приложений без дублирования кода.

https://habr.com/ru/articles/1010216/

#appium #java #android #adb #android_studio_emulator #allure #junit5 #selenide #mobile_testing #qa_automation

Несколько мобильных приложений в одном Appium‑проекте: как это можно организовать

В статье покажу: • как запускать тесты для нескольких мобильных приложений в одном Appium-проекте • как выбирать приложение через аннотацию • как сделать потокобезопасный фреймворк • как избежать...

Хабр

PS/2 ou ADB ?

Les deux prises se ressemblent terriblement, mais ne confondez pas l'ADB avec le PS/2 !

https://video.neliger.com/w/iCannjNfRZMrmQENkWYAqR

#ADB #PS2 #Apple #retro #retroTech #vintage #vintageTech #oldTech #retroComputing #PeerTube

PS/2 ou ADB ?

PeerTube
PS/2 ou ADB ?

PeerTube

Pixel Watch 2 - Privacy Preserving Setup

I've been trying everything i could think of to make the watch work under GrapheneOS - Here is what i learned:

  • Unpairing the Watch means factory resetting it.
  • Every feature (literally everything) is google dependent (who would have thought.. i know)
  • Pairing with your phone requires the "Pixel Watch" -App to be installed on your main profile (not work, not private space) alongside Google Play Services. There's no way around.

This is obviously unacceptable. So i did a bit of research and found a way that will not only be way more practical, it will also be private.

First i created a second user on my Phone, installed Google Play Services and the pixel watch app on it, logged in with a newly created google account and completed the setup.

I know some people use a chinese version of the WearOS app to bypass the google login. Since i don't want a chinese app to configure my watch, i didn't even try that.

After the watch was set up, i continued and:

  • Deleted the user profile from which i connected the Watch
  • Enabled wireless debugging
  • Debloated the watch as good as possible (i will have to root the watch in the future to properly do it)
  • Removed the Google account in the settings
  • Cleared all Bluetooth preferences
  • Enabled Bluetooth discovery
  • Installed KDE Connect on it (not meant for WearOS but it does work barely)

The watch is now in a state where i can use it daily.

But i also want to make use of all those fancy quality-of-life features, like heartrate monitoring, sleep tracking and so on.

Now comes the fun part.

I've created a basic Kotlin project with both a mobile and WearOS app.

I will implement features like:

  • Notification sync
  • Call notifications
  • Media Player Control
  • Weather (openweathermap)
  • Heartrate monitoring
  • Sleep tracking
  • Do not Distrurb Sync
  • Homelab integrations (Nextcloud, Immich, Uptime Kuma, ..)
  • And much more ..

The goal is to keep the watch offline, let the phone do the heavy lifting and communicate with a selfhosted database. I may even add a frontend and an API so people can integrate it for their needs.

Sounds good but why don't you just buy an #opensource #smartwatch like the #pinetime - You may ask.

Because as much as i hate to admit it, i love the design, the look and feel of the pixel watch. And i'm sure that i'm not the only one.

I also bought this one cheap for around 120€ #refurbished. So the value i can get out of it seems pretty good to me.

So much for today. I haven't even started tackling the Bluetooth connection yet 😅. Let's see how that turns out

I have added a poll to this post to see how many people would be interested in a setup like this. Please let me know if you have any suggestions, ideas or expertise in that regard.

Cheers.

#privacy #security #android #google #pixel #pixelwatch #degoogle #degoogling #degoogled #adb #rooting #grapheneos #smartwatch #development #wearos #bluetooth #qualityoflife #GooglePlay #GooglePlayServices #frontend #api #selfhosting #selfhosted #homelab #opensource

Very interested
44.4%
Slightly interested
44.4%
Not interested
11.1%
Poll ended at .
Notes to myself: This is how the really really old Samsung tablet takes a photo via adb and leaves it on the computer (e.g. a raspi:
# adb shell input keyevent 26
# adb shell am start -a android.media.action.IMAGE_CAPTURE --ez android.intent.extra.quickCapture true
# adb shell input touchscreen tap 970 300
# adb shell input touchscreen tap 770 570
# adb pull /sdcard/DCIM/Camera/
# adb shell rm /sdcard/DCIM/Camera/*
#android #adb #linux #opensource #raspi #raspberrypi