Mind Chasers Inc.
Mind Chasers Inc.

Note: Forum is in alpha testing. Please email us with any problems or issues you encounter. Thank you!

Stopping remote management, shaking shells, shooting APIs

Feb 10, 2022 asked by Jason
share
subscribe to mailing list:

Question / Issue:

Once a device is infected with malware, or is shelled by a remote intruder, is it worth the effort to try and resolve the issue, or just burn everything it ever touched? A factory reset is frequently a go to suggestion, but if a user has the option it doesn't prevent immediate reinfection, nor clear internal bloat. Especially with sdks packed into app stores like Trojans, it's likely that even flashing a fresh os carries the same risk factor as individually being infected by download ar random. So the question is really three parts; how does one close reliably prevent external manipulation of a mobile device if the attacker is provided token access, or is running APIs to a device via java card? How does one regain control of an actively "managed" device once the UI is an emulated shell? How does one kill all remotes, listeners or beacons if legitimately gaining root control isn't an option?
X-ray Engineering Services

Responses:

No responses yet

Post your answer or comment:

your email address will be kept private
authenticate with a 3rd party for enhanced features, such as image upload
previous month
next month
Su
Mo
Tu
Wd
Th
Fr
Sa
loading