diff --git a/src/mobile-pentesting/android-app-pentesting/README.md b/src/mobile-pentesting/android-app-pentesting/README.md index 423f8f6b0cc..b74afba4efb 100644 --- a/src/mobile-pentesting/android-app-pentesting/README.md +++ b/src/mobile-pentesting/android-app-pentesting/README.md @@ -54,6 +54,48 @@ java -jar ../APKEditor.jar m -i splits/ -o merged.apk java -jar uber-apk-signer.jar -a merged.apk --allowResign -o merged_signed ``` +## Predator-Style Mobile Implant Delivery & C2 Patterns + +Intellexa's 2025 Predator leaks expose a full-stack mobile exploitation pipeline that red and blue teams can reuse as a playbook for high-end implants targeting both Android and iOS devices ([source](https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/)). + +### Single-use 1-click orchestration + +- Operators generate per-target infection links inside Predator Delivery Studio (PDS/HDS). Each link is wrapped by an attacker-owned shortener named `urlchl1` that lives on a lure domain (often news look-alikes) before handing off to the true exploit server. +- When the victim opens the link in Chrome/Safari, chained browser exploits drop the Predator agent. Delivery telemetry (selector, IP, UA, OS build, exploit status) is streamed into Elastic dashboards to decide whether to re-arm or burn the link. +- For your own campaigns, treat single-use URLs as volatile secrets: bind them to selectors, throttle retries, and wipe the landing node after execution to limit forensics. + +### ISP, ad-tech and radio-based zero-click delivery + +- **Mars** performs HTTP response injection at ISP/mobile core routers: as soon as a watched selector loads any clear-text site, the middlebox injects an `