Notes:
Please try to choose the highest video resolution to watch the following demos, which is much more clear.
We blurred some advertisements and account information shown on the emulators in the following demos for anonymization purpose (e.g., our location).
We used Twitter, Facebook as the victim apps in the demo to make our attack clearer. In reality, they could be any app, especially Google Play Store and games (e.g., through our attack, user's valuable accounts and passwords could be stolen).
In the following demos, we have a malicious app on the emulator without any dangerous or privileged permissions. Once started, we could launch the following 5 types of attacks (see details in the paper).
Emulator: Bluestacks
In this attack, the attacker tries to steal user input (e.g., account crendentials) silently.
Emulator: NoxPlayer
Note:
After we start the attack, we do not move the user mouse. Instead, all the operations are done by the malicious app through injecting touch/keyboard events to the emulator.
Emulator: LDPlayer
In these 2 attacks, we create the phishing activity to cover or replace the legitimate one.
Attack 1: spoof the "focus" status of the tab
Attack 2: spoof the "content" of the tab
Emulator: MuMu
In this attack, we hijack the original app installation process to silently install our trojan apk file.
Emulator: MuMu
In this attack, we could gain root privilege through injecting commands to the exposed shell or adb daemon of the emulator.