University of Cambridge > > Churchill CompSci Talks > FluBot


Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Matthew Ireland.

A new strain of Android malware hit the stage in 2021; known as FluBot, it uses an overlay attack to impersonate banking apps in order to steal users’ credentials. What makes this malware stand out is its range of countermeasures which harden it against detection, analysis and mitigation. In this talk I will explain the operation of FluBot’s client, protocol and backend infrastructure.

This talk is part of the Churchill CompSci Talks series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.


© 2006-2024, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity