home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.mobile.android      Discussion about Android-based devices      236,147 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 235,451 of 236,147   
   Maria Sophia to Maria Sophia   
   Re: PSA: Using a PC to download Google P   
   06 Jan 26 09:06:21   
   
   XPost: alt.comp.os.windows-10, alt.comp.os.windows-11   
   From: mariasophia@comprehension.com   
      
   Maria Sophia wrote:   
   > Most people don't realize how brain dead the Google Play Store automatic   
   > updates is. They just assume it covers all their apps, but it's not even   
   > close as we've tested it and it's essentially garbage compared to what a   
   > real auto updater for Android will do for you. But that's not on the PC.   
      
   I want to redirect this tangent since Theo found that the Aurora PC app was   
   not from the approved sources, even as it seems to work by all accounts.   
      
   Since I goofed with this premature PSA, it behooves me to explain and delve   
   deeper to understand what this Aurora-PC stuff is, and what it is not.   
      
   Just to be clear, what happened was three steps that led to this PSA:   
    1. I was researching an answer for Qihe regarding spoofing   
    2. So I wrote up that answer pointing him to Aurora's spoofing   
    3. In that research, I ran into the PC Aurora so I wrote this PSA   
      
   I should have researched further the PC Aurora, as I had simply "assumed"   
   it was from the official developers. It's not. It's not an official Aurora.   
      
   Apparently it works. According to the telegram support for the real Aurora.   
   For now.   
      
   But we can't rely on PC Aurora because we are unaware of its provenance.   
      
   Having said that, I searched for security research on this so-called   
   PC-Aurora, and, strangely, I can find none.   
      
   So far, I can find zero published security-researcher analyses, malware   
   reports, threat-intel writeups, CVEs, or forensic reports about   
   aurorastore.org.   
      
   No major malware labs, no independent analysts, no reverse-engineers, no   
   threat-intel feeds, and no OSINT researchers have published anything on it.   
      
   As far as I can determine in quick searches anyway, it's not listed in:   
    VirusTotal collections   
    Hybrid Analysis   
    AnyRun   
    Joe Sandbox   
    Intezer   
    Malpedia   
    Abuse.ch   
    URLHaus   
    ThreatFox   
    OpenPhish   
    PhishTank   
    AlienVault OTX   
    GreyNoise   
      
   I can't find anything in the public forums and blogs about it either.   
    Recorded Future (public feeds)   
    BleepingComputer forums   
    MalwareTips forums   
    Mastodon infosec circles   
    OSINT communities   
    StackExchange Security   
    Twitter infosec accounts   
    XDA Developers   
    r/Android   
    r/AndroidDev   
    r/Malware   
      
   Nor can I find security research papers on it:   
    No papers   
    No blog posts   
    No advisories   
    No CVEs   
    No vendor bulletins   
      
   There are no samples I found in public malware databases tagged with:   
    aurorastore.org   
    "Aurora Store PC"   
    "AuroraStorePC.exe"   
    "AuroraStoreSetup.exe"   
    "AuroraStore Windows"   
   If malware exists, it does not seem to have been submitted to any public   
   analysis platform listed above.   
      
   Yet I get this from uBlock-origin-protection on some browsers:   
     uBlock Origin has prevented the following page from loading:   
     https://aurorastore.org/aurora-store-pc/   
     Because of the following filter:   
     ||aurorastore.org^$document   
     Found in:  uBlock filters ¡V Badware risks   
     [_]Don't warn me again about this site   
      
   Looking that up, apparently when uBlock blocks a domain at the document   
   level ($document), it means:   
    a. The domain has been explicitly classified as a badware risk   
    b. The classification is intentional, not heuristic   
    c. The domain was added manually by a maintainer or via a trusted feed   
   But, apparently uBlock does not perform malware analysis.   
   It flags risk, not payload.   
      
   But things don't get flagged lightly, where some of the rules that u-Block   
   Origin apparently uses are these below which likely fit the PC-Aurora tool.   
    a. it impersonates a known project   
    b. it distributes software that does not match the official project   
    c. it uses deceptive branding   
    d. it has been reported as suspicious by multiple users   
      
   As far as I can tell, there is no public threat-intel record of   
   aurorastore.org being malware or phishing. However, this does not mean it's   
   safe, but only that it has not been analyzed or reported or that it was   
   analyzed and nothing bad was found (yet).   
      
   But it's clearly an impersonation of branding so it's not to be trusted.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca