Google clamps down on Android developers with mandatory verification

https://fed.brid.gy/r/https://nerds.xyz/2026/03/android-developer-verification/

I would strongly encourage everyone who has a Google account to enable Advanced Protection via Google's #AdvancedProtectionProgram https://google.com/advancedprotection and if you have an #AndroidPhone, you should also enable enable Advanced Protection on your device as well.

On Pixel Devices:
-> Settings
-> Security and Privacy
-> Advanced Protection

And turn it on.

This gives you Google's highest level of protection for your device and account.

#GoogleSecurity #androidsecurity #securityforeveryone

:D

Advanced Protection Program

The strongest account security made to protect the personal data and information of people most at risk of phishing, hacking and targeted digital attacks.

Advanced Protection

Android malware advisory
WhatsApp droppers, Accessibility abuse
Full device takeover
OTP theft, overlays, persistence

Source: https://i4c.mha.gov.in/theme/resources/advisories/ADVISORY%20TAU-ADV-012-%20Android%20GOD%20Mode%20Advisory.pdf

👉 Audit permissions
🔔 Follow TechNadu

#Infosec #AndroidSecurity #CyberSecurity

Day 10 of #100VibeProjects 🔍

Built a local web tool that does static security analysis of Android APKs — upload an APK and get a report covering permissions, hardcoded secrets, SDK fingerprinting, cert pinning, and crypto posture.

The interesting part: the methodology came from reverse-engineering the WhiteHouse app teardown that went viral last week. Applied the same five-gate analysis framework to a real banking app.

Found an expired certificate pin (silently disables TLS pinning for all users), a session replay SDK with no confirmed masking rules, and four Adobe tracking SDKs doing cross-device user stitching.

The tool runs entirely locally. No data leaves your machine. APK deleted after analysis.

Stack: Python · Flask · androguard · 380 lines

📝 Blog: mrdee.in
https://mrdee.in/writing/vibecoding-day010-offline-apk-security-analyzer/

💻 GitHub Repo: https://github.com/mr-dinesh/Offline-APK-Analyzer

#VibeCoding #AppSec #AndroidSecurity #MobileSecurity #Python #Flask #DFIR #InfoSec #ReverseEngineering #CyberSecurity

Vibecoding-Day010-Create offline web tool for static security analysis of Android APK files

Building an Offline APK Security Analyzer in Flask Project #10 of the 100 Vibe Coding Projects challenge I’ve been doing APK security analysis manually for years — pulling the file, running jadx, grepping through decompiled source, eyeballing the manifest. It works, but it’s slow and the output lives in a terminal window that disappears the moment you close it. This week’s project: wrap that entire methodology into a local web tool. Upload an APK, get a structured risk report in your browser. No internet required, nothing stored, APK deleted the moment analysis completes.

Dee's Digest

Deleted 8 times on WeChat. Permanently suspended on X/Twitter.

The research: 28 CVEs, 3 RCE chains, unauthenticated national digital currency access.

Regulators engaged: CNPD, CSSF, HKMA, PDPC, CNNVD, CIRCL.

Surviving copies:
IPFS: gateway.pinata.cloud/ipfs/QmWUnbmgHsb3BMLufJWhzVaaZqd8j7XMjN2YVUmAGRGJ4C
Web: innora.ai/zfb/
Code: github.com/sgInnora/alipay-securityguard-analysis

If you're in mobile sec: peer review on the Lua VM RCE chain welcome. DMs open.

#InfoSec #censorship #AndroidSecurity

When the signature verifier is itself remotely replaceable...

PatchProxy controls 146,173 methods in Alipay, including verifyApk() — the trust anchor recursively under attacker control. Turtles all the way down.

Batch-3 filed (10 new, 28 total):
- PatchProxy RCE: CVSS 9.8
- Lua VM RCE: CVSS 9.8
- Payment auth bypass: CVSS 9.1

Details: innora.ai/zfb/

#AndroidSecurity #RCE #ReverseEngineering

This article more eloquently phrases how I feel about the new #android #sideloading rules: https://www.androidauthority.com/i-dont-recognize-android-i-fell-in-love-with-3650462/ I pretty much agree with everything that this journalist is saying.

The new rules might cause some friction -- but they generally make Android safer for everyone.

And that's always a good thing.

#googleandroid #androidsecurity

I don't recognize the Android I fell in love with anymore

Android has shifted under our eyes over the last 18 years, from open and free to dozens of obstacles and restrictions. Was it a victim of its own success?

Android Authority

Android sideloading is getting a new speed bump: Google will require a 24-hour wait before installing apps from unverified developers, a move supposedly meant to make malware and scam-driven installs harder to pull off.

https://thehackernews.com/2026/03/google-adds-24-hour-wait-for-unverified.html

#AndroidSecurity #Cybersecurity #Malware #MobileSecurity #Google

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

Google adds 24-hour sideloading delay amid 17 malware families in 4 months, reducing scam-driven installs and device compromise risk.

The Hacker News

Perseus Android trojan scans notes for crypto seeds & enables full device takeover via Accessibility abuse.

Advanced evasion marks next-gen mobile threats.

https://www.technadu.com/perseus-malware-based-on-phoenix-and-cerberus-predecessors-initiates-android-device-takeovers-targets-users-personal-notes/623847/

#Infosec #AndroidSecurity #ThreatIntel

Areizen présente «Reverse Engineering Android - Part II» (ENSIBS, 2019) — un must pour qui veut creuser le fonctionnement interne des apps Android ! Idéal pour devs & chercheurs en sécurité mobile. Slides et ressources incluses, à découvrir ! #ReverseEngineering #Android #AndroidSecurity #Sécurité #CyberSécurité #Hack2G2 #Areizen #French
https://videos.hack2g2.fr/videos/watch/989d8cb2-fb53-48b2-8b87-05c74ecaa601
Reverse Engineering Android - Part II - Areizen

PeerTube