Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add indicator file for known compromised Android app signing keys #17

Open
DonnchaC opened this issue Nov 8, 2024 · 0 comments
Open

Comments

@DonnchaC
Copy link
Contributor

DonnchaC commented Nov 8, 2024

Occasionally Android signing keys for APKs, and platform signing keys have been misused for Android malware.

We should consider adding leaked/public signing keys as MVT detections. Apps signed by these keys will be insecure and are often malware themselves. Some samples from: https://apvi.issues.chromium.org/issues/42420002

Certificate SHA256: 2464ddfefa071f268ea7667123df05ead2293272ff2a64d9cee021c38b46c6af
Certificate SHA256: 2bfa22964760a25d99ab9a14910e44fe2063b51d5b4ac2e4282573ce94996aa3
Certificate SHA256: 34df0e7a9f1cf1892e45c056b4973cd81ccf148a4050d11aea4ac5a65f900a42
Certificate SHA256: 369c38b18401ea16785f11720e37d7a2bc5a4d209e76955c0858ea469ad62fdf
Certificate SHA256: 4274243d7a954ac6482866f0cc67ca1843ca94d68a0ee53f837d6740a8134421
Certificate SHA256: 5304915c4bb7baca28776231993996fde1baffcbbe6500fb0fc7f2d3a2888cb7
Certificate SHA256: 9200c550f2374706eff37e3a8674bc03aeba8b25c052de638972ab94365af0a2
Certificate SHA256: 9fc510e167d8d312e758273285414e77edac9fed944741f5682be92501f095d4
Certificate SHA256: a7a0e10a61a5af93624376df60e9def9436358f50aa6174e5423633b856e2be1
Certificate SHA256: b01dcea669eefdd991fc6a24678a8b6e6a6d0ad8986950328c69d0eea1dec0d5
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant