Thursday, July 28, 2016

Must have apps for Hackers' mobile phones

Recently there is a post on flashpoint-intel.com about the Jihad's technologies used for their anonymity and other purposes in Mobiles. Here I will classify that article more details can be find at the above link.


When we go through that article we can see Jihads has very focused on mobile security with android. We will go by each category that they have used.

Secure Browsers.


Our mostly faithful browser is TOR. Jihads also using TOR browser for their internet surf but they are using additional layer of security also instead of the layer built-in TOR. Because now NSA has intervene with TOR.

Instead of TOR they are using Opera Browser also. The reason for this selection is because the new Opera provide free VPN service along with the browser. So they can mask their IP while browsing.




VPNs and Proxies

Jihad's favourite VPN is Cyber-Ghost VPN. They are strictly using this VPN service. But they also warned about that these VPNs not changing Hard disk serial number which will cause to track. So they are using another software called HardDiskSerialNumberChanger to change the hdd serial number.

Protected E-Mail Services.

Jihadists using following email services for their email anonymous.

Hush-mail


This particular service provides enhanced security within e-mail communications via encryption between Hushmail account holders and others based on standard OpenPGP. The service also provides a two-step verification functionality and unlimited e-mail aliases.

ProtonMail

This is another noteworthy encrypted e-mail service popular among today’s jihadists. Developed by CERN and MIT and Tech for Jihadbased in Switzerland, ProtonMail offers end-to-end encryption, an anonymous e-email account, and the security inherent to stringent Swiss privacy laws.

Tutanota


This is an open source, encrypted inbox service that, in addition to encrypting e-emails, encrypts e-mail subject lines and attachments. Compatible with all Android and iOS devices, Tutanota was developed in Germany.

Ghostmail

This Swiss encrypted e-mail service has also been advised by tech-savvy jihadists as trusted for both Android and iPhone operating systems.

YOPmail

After the January 2015 terror attacks in Paris, Al-Qaida’s branch in Yemen (AQAP), released an audio message about the attacks. This message was uploaded to the Internet Archives (archive[.]org), using an account from YOPmail – a disposable, temporary e-mail service that does not require registration or passwords. Accord-ing to its website, YOPmail “guards you against spam, phishing and other online abuses”. Even better, this temporary inbox lasts for only eight days. This feature further decreases the risk of having clandestine jihadist communications unveiled, even upon third-party investiga-tion of associated email addresses. YOPmail is reportedly the same e-mail service used by the infamous Sony hackers in 2014.

Mobile Security Applications

Locker


Automatically deletes user files once the number of incorrect lock-screen pass-code attempts crosses a certain threshold. It requires users to specify the number of incorrect unlock attempts allowed. If that number is exceeded, the app will completely wipe the user’s phone, thereby protecting personal information.

You can download in Google play here.

Fakegps

Provides a false physical location when used in tandem with certain social media platforms. Facebook and Twitter in particu-lar typically reveal or gather their users’ location via GPS. FAKE GPS circumvents this feature, enabling users to choose and reveal their own false location.

You can download in Google play here

D-vasive Pro

Disables other apps from using the smart phone’s camera, microphone, Bluetooth and WiFi to further enhance user privacy.

Download in Google Play here

AMC Security

Consists of comprehensive antivirus and security tools.

Download in Google Play here

ESET Mobile Security

Reportedly rated the best anti-virus app for Android devices, according to Horizons.

Download in Google Play here

Battery Saver

Preserves a device’s power supply.

Call/SMS Blocker

Rejects specified calls and text messages

Privasy Locker

Hides sensitive images and files

Download in Google Play here

APP Manager

Deletes and relocates specified apps.

iSHREDDER PRO

Allows users to permanently delete sensitive files.
You can have Enterprise and Pro versions to buy.
Download Free version in Google Play here

Override DNS

Obfuscates Android users’ IP addresses by changing the DNS (domain name services). Users must first obtain OpenNIC― an app necessary for the use of Over-ride DNS. Horizons recommends that users first shut down any Tor or VPN service before testing their IP location using the IPleak[.]net website to confirm their changed IP address.

Download in Google Play here

DNSCrypt

Helps users improve DNS security. This app is an open protocol that encrypts DNS data between user and server. However, Horizons emphasizes that DNSCrypt is not a substitution for VPN or Tor services. Users are urged to employ DNSCrypt alongside these proxy services to enhance security.

Download in Google Play here

Net Guard

An open source firewall that does not require root setup. This app allows users to specify which apps are connected to the Internet.

Download in Google Play here

AFWall

An open source mobile firewall security app. When used with Linux's IPtables it empowers users with full control over which apps connect to the Internet.

Download in Google Play here

F-Secure Freedome

An encrypted VPN service.

Download in Google Play here

F-Secure Key Password Manager

Secure password manager. Encrypting passwords.

Download in Google Play here

Hide.me

A Malaysian VPN service that preserves user privacy by not storing user data on company servers

Download in Google Play here

Tutanota

An encrypted e-mail service that comes especially recommended for use when registering VPN accounts.

Download in Google Play here

Encrypted Messengers

They use encrypted messengers for their messages to be hidden.

Threema

This Swiss application is an end-to-end encryption messenger. In April 2016, a pro-ISIS technology manual championed Threema, explaining how it “does not collect your personal info like phone numbers or email addresses, as it does not request you to enter identifiable informa-tion." Further, Threema will not "decrypt encrypted messages if the company faces government pressures." The manual added that Threema "virtually encrypt[s] pictures and files, audios and apps, and is strong against MITM [man-in-the-middle] attacks, and does not store any messages on the company's servers."

Download in Google Play here

Telegram

Despite the assortment of secure mes-saging platforms, Telegram, created by Russian VKontakte founder Pavel Durov, appears to be the top choice among both individual jihadists and official jihadist groups. These groups use Telegram for running media channels through which they disseminate official statements, claims of credit, videos, and propaganda. Nevertheless, today’s jihadists have emphatically urged their peers to rely solely on Telegram’s “Secret Chat” service. Essentially, while all Telegram messages are encrypted, standard messages use client-to-server encryption. These stan-dard messages are stored in the cloud and accessible across devices. Secret chats, on the other hand, use client-to-client encryption, which makes them readable only via the sending and receiving devices. Finally, when users delete a Secret Chat message from one device, it is automati-cally deleted from the other.

Download in Google Play here


So here are most Apps and softwares used by Jihadists for their anonymity and communications. These tools are very useful for hackers specially for hackers' mobile phones.

Happy Hacking !!!

No comments:

Post a Comment