<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: LIAPP</title>
    <description>The latest articles on DEV Community by LIAPP (@teamliapp).</description>
    <link>https://dev.to/teamliapp</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F887311%2F8cd869e2-d39b-4f1f-acd7-dccd1d37e9ab.png</url>
      <title>DEV Community: LIAPP</title>
      <link>https://dev.to/teamliapp</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/teamliapp"/>
    <language>en</language>
    <item>
      <title>"One-Click" for App Security!</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Thu, 10 Aug 2023 02:43:38 +0000</pubDate>
      <link>https://dev.to/teamliapp/one-click-for-app-security-22km</link>
      <guid>https://dev.to/teamliapp/one-click-for-app-security-22km</guid>
      <description>&lt;p&gt;Hello everyone!&lt;br&gt;
This is Team LIAPP!&lt;/p&gt;

&lt;p&gt;Did you know that you can secure your developed app with utmost ease, all with a single click?&lt;br&gt;
The answer is right here, with LIAPP!&lt;/p&gt;

&lt;p&gt;LIAPP provides hassle-free, robust, and highly visible security services, guaranteeing your mobile app's safety with just one effortless click!&lt;/p&gt;

&lt;p&gt;LIAPP allows you to focus on your business with simple way of protection and helps you succeed in a great mobile service with strong hacking defense and convenient user-oriented hacking reports.&lt;/p&gt;

&lt;p&gt;For an in-depth insight into the security features and what LIAPP has to offer, don't hesitate to explore our dedicated LIAPP website!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://liapp.lockincomp.com/" rel="noopener noreferrer"&gt;visit LIAPP&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>LIAPP's enhanced security features for the app!</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Thu, 20 Jul 2023 05:49:34 +0000</pubDate>
      <link>https://dev.to/teamliapp/liapps-enhanced-security-features-for-the-app-gpb</link>
      <guid>https://dev.to/teamliapp/liapps-enhanced-security-features-for-the-app-gpb</guid>
      <description>&lt;p&gt;Hello, LIAPP Team here!&lt;br&gt;
We are pleased to announce that LIAPP has come back with enhanced security features for your app!&lt;br&gt;
LIAPP's update details:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;New Octopus GG detection&lt;/li&gt;
&lt;li&gt;Enhanced Magisk detection&lt;/li&gt;
&lt;li&gt;Enhanced Magisk Alpha detection&lt;/li&gt;
&lt;li&gt;Enhanced Magisk Delta detection&lt;/li&gt;
&lt;li&gt;Enhanced app tampering detection&lt;/li&gt;
&lt;li&gt;Enhanced LDPlayer detection&lt;/li&gt;
&lt;li&gt;Strengthened LIAPP compatibility&lt;/li&gt;
&lt;li&gt;Strengthened BlueStacks compatibility&lt;/li&gt;
&lt;li&gt;Enhanced app performance speed&lt;/li&gt;
&lt;li&gt;Strengthened compatibility with OS and security folders&lt;/li&gt;
&lt;li&gt;Strengthened compatibility when converting aab files to universal.apk&lt;/li&gt;
&lt;li&gt;Strengthened compatibility with ONE GameLoop&lt;/li&gt;
&lt;li&gt;Strengthened LIAPP start function (init) to prevent ANR (Application Not Responding)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you have interested in app security, do not hesitate to contact us at: &lt;a href="mailto:support@lockincomp.com"&gt;support@lockincomp.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;See you!&lt;br&gt;
LIAPP TEAM&lt;/p&gt;

</description>
    </item>
    <item>
      <title>NEW LIAPP is coming!</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Wed, 28 Jun 2023 06:03:52 +0000</pubDate>
      <link>https://dev.to/teamliapp/new-liapp-is-coming-2hi2</link>
      <guid>https://dev.to/teamliapp/new-liapp-is-coming-2hi2</guid>
      <description>&lt;p&gt;Hello, LIAPP Team here!&lt;/p&gt;

&lt;p&gt;We are pleased to announce that LIAPP will renew our website and update the LIAPP security features to provide you with better service and improve the user interface. Please take note of the following LIAPP update notice to ensure a seamless experience.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Update Schedule: June 29, 2023, 21:00 - 24:00 (UTC + 9)&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;During the above mentioned LIAPP update, LIAPP website access and the ability to apply LIAPP will &lt;strong&gt;not&lt;/strong&gt; be available. We kindly request you to check the schedule in advance and plan your LIAPP usage accordingly.&lt;/p&gt;

&lt;p&gt;Furthermore, after the mentioned update, please apply LIAPP and conduct thorough testing before distributing your app.&lt;/p&gt;

&lt;p&gt;LIAPP update details:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;New Octopus GG detection&lt;/li&gt;
&lt;li&gt;Enhanced Magisk detection&lt;/li&gt;
&lt;li&gt;Enhanced Magisk Alpha detection&lt;/li&gt;
&lt;li&gt;Enhanced Magisk Delta detection&lt;/li&gt;
&lt;li&gt;Enhanced app tampering detection&lt;/li&gt;
&lt;li&gt;Enhanced LDPlayer detection&lt;/li&gt;
&lt;li&gt;Strengthened LIAPP compatibility&lt;/li&gt;
&lt;li&gt;Strengthened BlueStacks compatibility&lt;/li&gt;
&lt;li&gt;Enhanced app performance speed&lt;/li&gt;
&lt;li&gt;Strengthened compatibility with OS and security folders&lt;/li&gt;
&lt;li&gt;Strengthened compatibility when converting aab files to universal.apk&lt;/li&gt;
&lt;li&gt;Strengthened compatibility with ONE GameLoop&lt;/li&gt;
&lt;li&gt;Strengthened LIAPP start function (init) to prevent ANR (Application Not Responding)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you have any additional inquiries, please feel free to contact us at &lt;a href="mailto:support@lockincomp.com"&gt;support@lockincomp.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;(Note: If you encounter any issues accessing the LIAPP website after the mentioned update, please try clearing your browser's cookies and cache before retrying.)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://liapp.lockincomp.com/?utm_source=newsletter&amp;amp;utm_medium=email&amp;amp;utm_campaign=20230628-techcommunity_for_LIAPPupdate_en" rel="noopener noreferrer"&gt;Want to know more about LIAPP? visit LIAPP!&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks!&lt;br&gt;
LIAPP TEAM&lt;/p&gt;

</description>
    </item>
    <item>
      <title>New LIAPP website is coming!</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Thu, 15 Jun 2023 06:46:47 +0000</pubDate>
      <link>https://dev.to/teamliapp/new-liapp-website-is-coming-1h9j</link>
      <guid>https://dev.to/teamliapp/new-liapp-website-is-coming-1h9j</guid>
      <description>&lt;p&gt;Hello, LIAPP TEAM here!&lt;/p&gt;

&lt;p&gt;LIAPP TEAM would like to inform you about the upcoming LIAPP update and the renewal of our website.&lt;br&gt;
LIAPP is coming with updates and a new website in late June!&lt;/p&gt;

&lt;p&gt;LIAPP Update Details:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;New Octopus GG detection feature.&lt;/li&gt;
&lt;li&gt;Strengthened Magisk detection capability.&lt;/li&gt;
&lt;li&gt;Enhanced Magisk Alpha detection.&lt;/li&gt;
&lt;li&gt;Enhanced Magisk Delta detection.&lt;/li&gt;
&lt;li&gt;Enhanced app tampering detection.&lt;/li&gt;
&lt;li&gt;Enhanced LDPlayer detection.&lt;/li&gt;
&lt;li&gt;Strengthened LIAPP compatibility.&lt;/li&gt;
&lt;li&gt;Strengthened BlueStacks compatibility.&lt;/li&gt;
&lt;li&gt;Strengthened app performance speed.&lt;/li&gt;
&lt;li&gt;Strengthened compatibility with operating systems and security folders.&lt;/li&gt;
&lt;li&gt;Strengthened compatibility when converting aab files to universal.apk.&lt;/li&gt;
&lt;li&gt;Strengthened compatibility with ONE GameLoop.&lt;/li&gt;
&lt;li&gt;Strengthened LIAPP initialization function (init) to prevent ANR.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Stay tuned with LIAPP!&lt;br&gt;
LIAPP is coming for better service.&lt;br&gt;
Do you want to know more about LIAPP and the update? &lt;br&gt;
Come and visit &lt;a href="https://liapp.lockincomp.com/?utm_source=newsletter&amp;amp;utm_medium=email&amp;amp;utm_campaign=20230615-techcommunity_LIAPPupdate_en_dev" rel="noopener noreferrer"&gt;LIAPP!&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>To apply security on APP I developed 1 - Analyze APP</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Tue, 16 May 2023 05:34:57 +0000</pubDate>
      <link>https://dev.to/teamliapp/to-apply-security-on-app-i-developed-1-analyze-app-1a3n</link>
      <guid>https://dev.to/teamliapp/to-apply-security-on-app-i-developed-1-analyze-app-1a3n</guid>
      <description>&lt;p&gt;The application of the LIAPP is divided into three steps.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;(1) Analyze APP&lt;br&gt;
(2) Apply Security&lt;br&gt;
(3) Download and Distribution&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;(1) ‘Analyze APP’&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa0ayhga43e7x9c34nlhc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa0ayhga43e7x9c34nlhc.png" alt="Image description" width="594" height="251"&gt;&lt;/a&gt;&lt;br&gt;
This is a very useful step for people who don’t know what security options to apply to their APP.&lt;br&gt;
Click the ‘NEW APP’ button on the left side of the LIAPP site to easily enter the ‘Analyze APP’ step, as shown below.&lt;/p&gt;

&lt;p&gt;[ OS ]&lt;br&gt;
It distinguishes whether the app has been developed for Android or iOS.&lt;/p&gt;

&lt;p&gt;[ NAME ]&lt;br&gt;
This field is entered the name of the app for your convenience.&lt;br&gt;
Finally, drag &amp;amp; drop app files or select files(android : .apk, iOS : .IPA) and click the ‘GO’ button to start an app analysis and appear the selectable options by user among the suitable security options.&lt;/p&gt;

&lt;p&gt;[ 1st step : select class to protect ]&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4caytvmibffh5lzx9ko.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4caytvmibffh5lzx9ko.png" alt="Image description" width="347" height="156"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The first page is a page you can select the important classes you want to protect within the app.&lt;br&gt;
When entering this page, LIAPP analogizes the class to be initially protected and suggests basically.&lt;br&gt;
Once set. LIAPP will encrypt the selected class within the app in the next ‘Apply Security’ step and encrypts the important/critical string declared internally.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Class encryption and important/critical string encryption are one of the most important functions for protecting apps.&lt;br&gt;
These functions may not leak important functions and information from hackers or competitors by not exposing POST values, URLs, account information, and other extremely important information declared by the app during development.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Please note that Class encryption is one of the most resourse-intensive tasks when running apps.&lt;br&gt;
Therefore, it is not recommended to select classes that will not need to be protected by the fact that the more classes you choose, the slower the app will be initially driven.&lt;br&gt;
Class that you don’t need to protect.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The basic classes provided by Android, or 3rd party sdk downloaded and used externally, are not important properties of the company, so it is effective in execution.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8tfdugbj1vmgxy1nb76n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8tfdugbj1vmgxy1nb76n.png" alt="Image description" width="478" height="163"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The second page is for customers who use the ‘google play app signing’ system provided by Google market.&lt;br&gt;
Using google play app signing is to avoid detection of the anti-tamper function of the LIAPP because a new signing is made by using the signing key registered with google , rather than the last one you signed and some internal files are also changed.&lt;br&gt;
If you don’t use the ‘google play app signing’ system, you can proceed to the next step without selecting the appropriate part.&lt;/p&gt;

&lt;p&gt;[ 3rd step : JNI NATIVE FILE PROTECTION ]&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkueexlxun57ttxnoh9gv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkueexlxun57ttxnoh9gv.png" alt="Image description" width="491" height="125"&gt;&lt;/a&gt;&lt;br&gt;
The third page is a function that protects the JNI NATIVE LIBRARY used by the app.&lt;br&gt;
Select any file in the list that you want to protect and it will be encrypted and stored in the app to prevent malicious analysis.&lt;br&gt;
If you are not using JNI NATIVE LIBRARY, the page does not appear.&lt;/p&gt;

&lt;p&gt;[ 4th step : UNITY Protection ]&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxs4ix0wz5pgaanlunuql.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxs4ix0wz5pgaanlunuql.png" alt="Image description" width="383" height="163"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The fourth page is for users who have developed apps using UNITY.&lt;br&gt;
Click the check box to encrypt and protect the sensitive code of the user created by UNITY.&lt;/p&gt;

&lt;p&gt;This concludes all the procedures for app analysis.&lt;br&gt;
It’s a little bit longer to explain the precautions and the actions actually being protected by the LIAPP, but if you go ahead, you’ll see a few clicks that ends very quickly.&lt;/p&gt;

&lt;p&gt;If you want to learn details about it, visit LIAPP’s website @ &lt;a href="https://liapp.lockincomp.com/blog/" rel="noopener noreferrer"&gt;https://liapp.lockincomp.com/blog/&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>New Android banking trojan called "Sharkbot", its way of attack and how to defend</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Mon, 24 Apr 2023 02:40:19 +0000</pubDate>
      <link>https://dev.to/teamliapp/new-android-banking-trojan-called-sharkbot-its-way-of-attack-and-how-to-defend-1p0h</link>
      <guid>https://dev.to/teamliapp/new-android-banking-trojan-called-sharkbot-its-way-of-attack-and-how-to-defend-1p0h</guid>
      <description>&lt;p&gt;&lt;strong&gt;Malware? not the antivirus?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Antivirus app downloaded to prevent from hacking, but this app has been controversial as it has been found to be malicious malware that infiltrates users' mobile devices, manipulates banking applications, and remits assets to the outside.&lt;br&gt;
"Sharkbot", a Trojan horse that first appeared in October 2021 and continues disturbing Google. These can be easily downloaded from the official Google Play Store, but it turns into malicious apps at some point after being installed on the user's smartphone.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhpw261az5cvku48z8ank.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhpw261az5cvku48z8ank.png" alt="Image description" width="602" height="321"&gt;&lt;/a&gt;&lt;br&gt;
What is Sharkbot?&lt;/p&gt;

&lt;p&gt;Sharkbot is a new-generation Android banking Trojan discovered by the Threat Intelligence team of the security company Cleafy. Sharkbot masquerades as a mobile app or a commonly used app with common name and icon.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1yvq3dmixyfrdl2pk5u9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1yvq3dmixyfrdl2pk5u9.png" alt="Image description" width="602" height="207"&gt;&lt;/a&gt;&lt;br&gt;
Sharkbot is known to use the work "Sharked" in the binary of the APK file, and once the malware is installed, it executes key logging, SMS message interception, overlay attack, and remote control commands. Thee apps were already downloaded by more than 15,000 users worldwide, with most victims believed to be in the UK and Italy. Google, of course, they quickly deleted these apps and announced that they took action on other apps presumed to be Sharkbot.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How did they trick Google?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Usually, the app must go through a pre-inspection process prior to registering an app on an official stores such as Google Play. However, Sharkbot has been registered as a safe app as if it were a safe application tricking Google. How did this happen?&lt;br&gt;
According to the analysis, Sharkbot has a variety of anti-analysis functions which allows it to detect sandbox environment or adjust the triggering time of hacking. Above all, full-fledged malicious functions are additionally downloaded from external C&amp;amp;C servers. This is the reason that there were no problems found during the inspection of the Google Play Store.&lt;br&gt;
It is very difficult to catch Sharkbot that has a domain generation algorithm (DGA) that can freely change external C&amp;amp;C domain and a geofence functions that deactivate malicious functions in a specific area.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How did Sharkbot get a permission from users?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Sharkbot dpownloaded on the user's smartphone reveals it's malignity the moment it receives an external command. Sharkbot is similar to other malware such as TeaBot and UBEL, it displays malicious pop-ups that repeatedly ask for extensive permission to steal user's sensitive information. Sharkbot, like other similar malware such as TeaBot and UBEL, displays malicious pop-ups that repeatedly require extensive authorization to steal user's sensitive information.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fujnlgt0hnhfrdjgq3rtc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fujnlgt0hnhfrdjgq3rtc.png" alt="Image description" width="800" height="407"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Sharkbot will be able to get all the permissions (declared in the AndroidManifest file) needed to hack the banking app once accessibility permissions and services are activated by user.&lt;br&gt;
Sharkbot then uses Android's accessibility service authority to display an overlaid window over a normal mobile banking app to induce the user to enter personal information, obtain the login credentials of the acquired bank app, and send them to a malicious server.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvfr1jq1kmh9rtkl0v4yr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvfr1jq1kmh9rtkl0v4yr.png" alt="Image description" width="343" height="278"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ATS (Automatic Transmission System) of the Sharkbot&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4bg0r8im1j407ug9yn61.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4bg0r8im1j407ug9yn61.png" alt="Image description" width="602" height="274"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This information is used to access email, social media, online bank accounts, and more. With the permissions shown in the figure above, the Sharkbot can read or send text messages and perform overlay attacks. In particular, the REQUEST_IGNORE_BATTERY_OPTIMIZATIONS permission could bypass Android's doze component and connect to the C2 server to continue its malicious action.&lt;br&gt;
Money is now transferred out of the victim's bank account. During this process Sharkbot can intercept the device's SMS messages and use them to get the 2FA sent by the bank. As attackers do not have to register new device for fraudulent activity, it is difficult to detect that money are being stolen even if the money is transferred from the victim's bank account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The way how SharkBot avoids detection&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;SharkBot has a technology to avoid from anti-virus detection. It includes several features to avoid analysis and detection, such as inspecting and running emulators, encrypting command and control communication with remote servers, and hiding icons from the home screen after installation. Strings can be obfuscated to slow down static analysis and hide all commands and sensitive information used by the malware. Below is a list of other evasion features Sharkbot are using.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Anti-emulator : It determines whether it is a real phone or an emulator when malware is installed on a device.&lt;/li&gt;
&lt;li&gt;External ATS module : The installed malware downloads additional modules from C2, and external modules are ".JAR" files that contain all the functions used to perform ATS attacks. This module is analyzed by Sharkbot in paragraph of the ATS module.&lt;/li&gt;
&lt;li&gt;Hide icon app : If malicious program is installed, Sharkbot hides from the app's icon from the device screen.&lt;/li&gt;
&lt;li&gt;Prevent deletion : Sharkbot uses accessibility services to prevent users from uninstalling the program from the setting options like other malware.&lt;/li&gt;
&lt;li&gt;Encrypted communication : All communication between the malware and C2 is encrypted and encoded with Base64, also use the domain generation algorithm (DGA).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;How to detect and prevent Sharkbot?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;While various security comapanies and stores are trying to defend themselves, it is no longer safe to trust such as APP Store and Google Play.&lt;br&gt;
Users need to be alert now that malicious apps that try to hack into banking are constantly discovering new versions. This is why users should avoid installing apps that are unknown sources or that require excessive permissions, and periodically update legitimate antivirus to the latest version. In addition, it is important for individuals to carefully check the reviews, number of downloads and developer information each time downloading an app. It is also recommended to suspect and view apps that request permission for accessibility services unless there is a special case.&lt;br&gt;
Companies that provide banking apps should take proactive steps to strengthen the security of the apps themselves and to detect&amp;amp;block malicious malware. LIAPP can detect apps known as Sharkbot through pattern detection. Also, LIAPP can prevent Sharkbot from hacking banking apps by performing functions such as overlay detection, remote control program detection, and screen capture program prevention. If you are a banking app service company, please contact the LIAPP team about Sharkbot. We will provide with more detailed consultation.&lt;/p&gt;

&lt;p&gt;LIAPP, we provide the best service possible.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Google’s policy on target API level and LIAPP’s compatibility.</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Thu, 23 Mar 2023 05:54:36 +0000</pubDate>
      <link>https://dev.to/teamliapp/googles-policy-on-target-api-level-and-liapps-compatibility-5h6h</link>
      <guid>https://dev.to/teamliapp/googles-policy-on-target-api-level-and-liapps-compatibility-5h6h</guid>
      <description>&lt;p&gt;Hello readers! A news flash here!&lt;/p&gt;

&lt;p&gt;Do you remember that Google announced that they are expanding the target API level requirement for the purpose of protection of users’ privacy and security?&lt;/p&gt;

&lt;p&gt;Starting August 31, 2023, &lt;br&gt;
• New apps and app updates must target API level 33 (Wear OS must target API 30).&lt;br&gt;
• Existing apps must target API level 31 or above to discover from Google Play.  (Apps that target API level 30 or below (target API level 29 or below for Wear OS), will only be discoverable on devices running Android OS same or lower than your apps’ target API level.)&lt;/p&gt;

&lt;p&gt;Although this may request to extend until Nov 1, 2023, expansion of the target API level is unavoidable.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;But don’t worry! LIAPP has no problem even with API level 33. We already went through the compatibility test.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This means it is possible to apply LIAPP to app targeting the latest API level.&lt;br&gt;
Be agile in responding to Google policies and always stay vigilant to provide your app and users with a more secure app service!&lt;/p&gt;

&lt;p&gt;LIAPP is here with you to protect your app with recent policy of Google.&lt;/p&gt;

&lt;p&gt;We want to make sure you have ample time and resources to get prepared:&lt;br&gt;
• For exact timelines,&lt;a href="https://support.google.com/googleplay/android-developer/answer/11926878" rel="noopener noreferrer"&gt;Target API level requirements for Google Play apps &lt;/a&gt;&lt;br&gt;
• For technical guidance, refer to this &lt;a href="https://notifications.google.com/g/p/APdRdFyvgR05Fd75RdTfC6X_z1205T8o6ixFD50wJTRk8FA8QjEGTf5JXWXE7AxygFJx41JToCo5Wi5CMrQ1ZQUx8waW4AftONv2MyiZH8NLn0wVJjhlRpV5v9tIVZGNn-OEPovlgWIABD5ac3ApH6KrAQDHXrXWr5MKd3DgcusUx2GcuvlTFdyZ1dHcMzLqWy-mxzEpzScSDhykWJL1YX5HDpGUvNGOrYnvP_Z5czv_Mg" rel="noopener noreferrer"&gt;migration guide &lt;/a&gt;&lt;br&gt;
• To learn more, watch the April 2022 &lt;a href="https://www.youtube.com/watch?v=O0UwUF2DgQc" rel="noopener noreferrer"&gt;PolicyBytes&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>LIAPP has won an award in Cyber Security Awards 2023!</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Thu, 09 Mar 2023 06:57:20 +0000</pubDate>
      <link>https://dev.to/teamliapp/liapp-has-won-an-award-in-cyber-security-awards-2023-oa5</link>
      <guid>https://dev.to/teamliapp/liapp-has-won-an-award-in-cyber-security-awards-2023-oa5</guid>
      <description>&lt;p&gt;Hello! This is the LIAPP team!&lt;/p&gt;

&lt;p&gt;We are excited to share some great news with you. &lt;br&gt;
LIAPP has recently won awards in three different categories Mobile Application Security, Application Security, and Runtime Application Self-Protection, which are all related to app security. &lt;br&gt;
Winning these awards is a testament to LIAPP's commitment to ensuring top-notch app security.&lt;/p&gt;

&lt;p&gt;We take pride in our app security and we believe that through LIAPP, your developed app too can be secure. &lt;br&gt;
So why not give LIAPP a try and see for yourself how we can help you with your app security needs?&lt;/p&gt;

&lt;p&gt;LIAPP protects apps using its action-based detection system and is currently being used in various industries such as fintech, gaming, and enterprise in multiple countries.&lt;/p&gt;

&lt;p&gt;We are confident in LIAPP's app protection system!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;LIAPP, we provide the best service possible.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>A Response Measure to the Security Threat of Virtual Space App</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Thu, 02 Mar 2023 07:28:24 +0000</pubDate>
      <link>https://dev.to/teamliapp/a-response-measure-to-the-security-threat-of-virtual-space-app-5c35</link>
      <guid>https://dev.to/teamliapp/a-response-measure-to-the-security-threat-of-virtual-space-app-5c35</guid>
      <description>&lt;p&gt;&lt;strong&gt;Virtual Space App&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Recently, the Virtual Space App, which allows you to use the same app dual on one smartphone, has been gaining popularity. Virtual Space App creates an isolated virtual environment within a single smartphone and provides an environment where the same app can run dually inside. For example, SNS and chat apps are dually created on one device, so you can log in to two accounts simultaneously without logging out and play the same game with two IDs simultaneously.&lt;br&gt;
his convenience exposes many security threats to users who use Virtual Space App and to users who use Virtual Space App and the APP services they install on Virtual Space App to run dual.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Two Sides of Virtual Space App security threats&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;With this Virtual Space App, you can easily create dual apps because one app can be run through multiple instances, but behind this convenience, there are also many security problems.&lt;/p&gt;

&lt;p&gt;Basically, apps installed on Android manage the data they generate in the sandbox area, which runs with its own UID(user identifier) and GID(group identifier) when the app is installed. These separately managed apps on the system cannot invade each other's sandbox area, so you can isolate apps from each other and protect them from malicious apps.&lt;/p&gt;

&lt;p&gt;However, suppose you install certain apps on the Virtual Space App to use dual apps. In that case, the UID and GID of all apps in the Virtual Space App are set to the same, allowing access to each app's usage area and memory, which poses a significant security threat.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F02arr7fb33z45l7cct0d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F02arr7fb33z45l7cct0d.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For users who use the Virtual Space App, the Guest App installed inside the Virtual Space App requires additional user data access to prevent the app from crashing, dramatically increasing the security threat inside the mobile system.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3ci229wcyc0c4vll9ryp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3ci229wcyc0c4vll9ryp.png" alt="Image description" width="800" height="599"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Threats to APP&lt;/strong&gt;&lt;br&gt;
In Virtual Space App, various isolation mechanisms provided by the Android system, such as permissions, storage, and components, are broken. Even if an app already has basic security functions, when run inside the Virtual Space App, the security sandbox is unlocked, exposing malicious malware apps installed inside to hacking threats such as accessing personal files or replicating and tampering with common apps.&lt;br&gt;
In addition, each other's processes can be accessed within the same Virtual Space App, so you can receive the same level of threats as those from the rooted device, such as memory tampering.&lt;br&gt;
In the case of a specific memory cheating tool, the use of Virtual Space App is recommended among execution methods on non-rooted devices, so it is emerging as one of the threats to be blocked for safe APP service.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxicw452h55f99b9b9jby.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxicw452h55f99b9b9jby.png" alt="Image description" width="800" height="638"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The following are the types of attacks that an APP installed in the Virtual Space App can receive.&lt;/p&gt;

&lt;p&gt;(1) Increase permissions attack&lt;/p&gt;

&lt;p&gt;Generally, when you use a virtual space app, your device pre-applies several permissions and features. If malicious malware APP is installed inside a virtual space app, you can use these permissions to access or leak sensitive data, such as user search history and cookies. This means that customer information of common apps installed inside virtual space apps and important information about app services may be exposed. Other processes can also access memory on my APP that can be used to expose critical memory and memory tampering attacks.&lt;/p&gt;

&lt;p&gt;(2) Code insertion attack&lt;/p&gt;

&lt;p&gt;Inside the Virtual Space App, a malicious Malware APP can tamper with the executables of other APPs, which are loaded via dynamic loading. At runtime, most APPs can load executable files (such as .dex files, .jar files, .so files) stored in private directories, and malicious Malware APPs installed inside the Virtual Space App can tamper with or replace these files, which can lead to code insertion attacks on other targeted APPs.&lt;/p&gt;

&lt;p&gt;(3) Replication attack&lt;/p&gt;

&lt;p&gt;If malicious malware APP A and regular app B are executed in the same Virtual Space App, A can secretly compress and upload important information created and entered when B is running to a remote server. You will be able to log directly into the regular app.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Users Who Installed Virtual Space App Will Face the Following Threats&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In fact, the Virtual Space App is designed for your convenience. In fact, the Virtual Space App is designed for your convenience. Specifically, users who install Virtual Space App are exposed to hacking threats due to Virtual Space App attacks and malicious malware attacks. Below is a description of the threats faced by the user who installed the Virtual Space App and the hacker attacks.&lt;/p&gt;

&lt;p&gt;(1) Hijacking attack&lt;/p&gt;

&lt;p&gt;It is a hijacking attack that can arbitrarily control the execution of an APP on a device with the numerous privileges of the Virtual Space App. For example, a malicious Virtual Space App can intercept user input from the login window after APP starts with root permissions on the victim's device. This user's login eligibility is captured, and malware can remotely upload them to the server to intercept and exploit the user's input data.&lt;/p&gt;

&lt;p&gt;(2) Ransomware attack&lt;/p&gt;

&lt;p&gt;Inside the Virtual Space App, a malicious Malware APP can encrypt or delete files from other APPs. The attacker demands a certain amount of ransom from the user, and the user must pay the ransom to restore the original file. Because this ransomware can be automatically propagated to cloud servers and other client devices, it is also dangerous that files encrypted with malicious Guest App can be uploaded to the cloud through the automatic synchronization mechanism of the cloud.&lt;/p&gt;

&lt;p&gt;(3) Phishing attack&lt;/p&gt;

&lt;p&gt;In Android 5.0 and later, third-party apps cannot call the getRunningTasks() function to obtain foreground application process information, but this is allowed within the Virtual Space App. This enables a phishing attack in which a malicious Guest App intercepts the security information that the user enters in the Android app. This may expose the information entered by the user.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A Response Measure to the Security Threat of Virtual Space App&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The fundamental reason for all these security risks is that the apps installed within the Virtual Space App share the same UID, so access rights are shared.&lt;br&gt;
In any case, it's never a good idea to set a level of security that makes your app data accessible to anyone.&lt;br&gt;
Therefore, in order to defend against these security threats, users should refrain from using the Virtual Space App, and service providers that service the APP should be able to detect and block the APP running in the Virtual Space App.&lt;/p&gt;

&lt;p&gt;LIAPP detects that your mobile app is running on the Virtual Space App, protects the app by blocking it from running, and protects it from the risk of exposing sensitive information from APP users.&lt;br&gt;
As Virtual Space App users continue to increase, LIAPP team strongly recommends preparing thoroughly for security.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzrmksof906molaknu43n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzrmksof906molaknu43n.png" alt="Image description" width="800" height="541"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;LIAPP, we provide the best service possible.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>[TECH]PCI SSC Security Requirements for Fintech Apps</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Fri, 24 Feb 2023 04:40:19 +0000</pubDate>
      <link>https://dev.to/teamliapp/techpci-ssc-security-requirements-for-fintech-apps-bp5</link>
      <guid>https://dev.to/teamliapp/techpci-ssc-security-requirements-for-fintech-apps-bp5</guid>
      <description>&lt;p&gt;Hello, this is LIAPP TEAM.&lt;/p&gt;

&lt;p&gt;The security issue of Fintech apps is emerging as a hot topic in various fields worldwide. xpectations for Fintech apps are rising as financial services become more advanced and payments in non-financial IT sectors are active. Still, the frequency of personal information leakage accidents is also increasing. Therefore, to make lesser concerns about the exposure of personal information of Fintech app users, Fintech companies should do their best to strengthen security with safety as collateral, away from reckless evasion of responsibility.&lt;/p&gt;

&lt;p&gt;For this reason, the payment card industry data security standard (PCI-DSS, Payment Card Industry Data Security Standard) is emerging as a security standard for Fintech companies. Five multinational card payment brands, VISA, MasterCard, American Express, DISCOVER, and JCB International, have established the Payment Card Industry Security Standards Committee (Payment Card Industry Security Standards Council, hereafter PCI SSC).&lt;/p&gt;

&lt;p&gt;Their mission is to protect personal information related to payment and provide technical requirements for protecting cardholders' data and sensitive personal information data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8lkr3nil9zhs593dwsqw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8lkr3nil9zhs593dwsqw.png" alt=" " width="750" height="200"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This content has been written to help you understand each item of the PCI Mobile Payment Acceptance Security Guidelines, issued separately by the PCI SSC for the security of mobile card payment systems. In addition, we will introduce the security features of LIAPP that can be applied to each item in order to comply with PCI regulations and show you how to protect Fintech apps strongly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;LIAPP Auth&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;4.2 Create server-side controls and report unauthorized access&lt;/p&gt;

&lt;p&gt;This recommendation is for developing a comprehensive payment authorization solution that can detect, report, and disconnect unauthorized access attempts or abnormal behavior to mobile apps. This is the LIAPP Auth function of LIAPP, which blocks bypass connections directly to the app server, and can be set up to prevent the app from running through an abnormal path.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Detect and block LIAPP Root/Jailbroken and Virtual Machine Devices&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;4.3 Prevent escalation of privileges&lt;/p&gt;

&lt;p&gt;It is recommended to block routing, run apps on escaped devices, and increase security by sending alarms or warning messages if a risk is detected. However, mobile hacking is primarily caused by not blocking unauthorized connections. LIAPP can detect unauthorized access from routing, rooted or jailbroken devices, OS-tampered devices, and virtual machines, sending out alarms and strongly blocking app execution and access.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcz5oroip4f7rcf7ojvcd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcz5oroip4f7rcf7ojvcd.png" alt=" " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;LIAPP Anti-Tampering, Anti-Debugging and Anti- Repackaging&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;4.7 Harden the application&lt;/p&gt;

&lt;p&gt;This item is an application enhancement that prevents users from unintentionally accessing mobile apps or inserting malicious code and recommends anti-tempering with reverse engineering. LIAPP prevents analysis through decompile or reverse engineering by encrypting critical source codes, dynamic analysis during app execution with an anti-debugging function, and blocks tampering with the app by detecting signs of app modulation. Anti-repacking blocking can also prevent malicious redistribution by protecting sensitive information files used by apps.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;LIAPP Realtime Hacking Tools Registration&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;4.10 Protect against known vulnerabilities&lt;/p&gt;

&lt;p&gt;It recommends patching mobile devices and apps to ensure they are always up to date. As a result, LIAPP can strongly block known hacking techniques and directly register hacking tools to address the latest security vulnerabilities.&lt;br&gt;
LIAPP's premium plans; LIAPP Enterprise and LIAPP For Game provide servers and monitoring dashboards dedicated to customers, enabling real-time reporting of the number of app users, hacking incidence, and hacking types. In addition, users can immediately change the on/off button to enable features such as anti-debugging, integrity modulation detection, virtual machine detection, hacking tool detection, and administrator rights detection.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafu9fexfzy3y0frbm3aj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafu9fexfzy3y0frbm3aj.png" alt=" " width="800" height="390"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Compliance with PCI SSC security regulations is not just about preventing privacy leaks. In addition, it increases the reliability of Fintech apps, improving its reputation for Fintech services. As mobile payments through Fintech apps gradually play a central role in the payment industry, compliance with related regulations is now becoming an essential factor. Compliance with PCI SSC may initially seem complicated, but mobile security services such as LIAPP make it easier and simpler to apply security features.&lt;/p&gt;

&lt;p&gt;If you've already released or are preparing for a Fintech app, why don't you take this opportunity to strengthen your mobile app security policy with LIAPP? About a month before the app's launch, LIAPP team recommends a schedule to distribute it to the market by strengthening security in advance. We hope that it will become a Fintech app service that runs fast in the global market with LIAPP in the future.&lt;/p&gt;

&lt;p&gt;[Source of data]&lt;br&gt;
&lt;a href="https://www.pcisecuritystandards.org/pci_security/" rel="noopener noreferrer"&gt;https://www.pcisecuritystandards.org/pci_security/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.pcisecuritystandards.org/about_us/" rel="noopener noreferrer"&gt;https://www.pcisecuritystandards.org/about_us/&lt;/a&gt;&lt;br&gt;
PCI Mobile Payment Acceptance Security Guidelines / PCI Mobile Payment Acceptance Security Guidelines for Developers.pdf&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;LIAPP, we only offer the best service.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>frontend</category>
      <category>devops</category>
      <category>cloud</category>
      <category>fullstack</category>
    </item>
    <item>
      <title>[LIAPP FEATURES] React Native Protection</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Fri, 17 Feb 2023 06:49:12 +0000</pubDate>
      <link>https://dev.to/teamliapp/liapp-features-react-native-protection-n2c</link>
      <guid>https://dev.to/teamliapp/liapp-features-react-native-protection-n2c</guid>
      <description>&lt;p&gt;LIAPP provides robust and useful features to protect mobile apps against various threats.&lt;br&gt;
This post will discuss LIAPP’s React Native protection to protect mobile apps made by React Native. We will explain how it works and what its effect is.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdmppnqm0yir5ojb7ekhg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdmppnqm0yir5ojb7ekhg.png" alt=" " width="627" height="71"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With the tremendous popularity of React Native, there are quite a lot of Hybrid apps released developed by React Native.&lt;br&gt;
It is a top priority to protect app services made by React Native.&lt;/p&gt;

&lt;p&gt;LIAPP provides diverse security features to protect app services developed by React Native, especially LIAPP’s React Native Protection provides a feature to protect bundle file ( java script file(.js)) by encryption.&lt;/p&gt;

&lt;p&gt;And it is LIAPP’s specialty to maintain high security by creating an encrypted key every time it is applied.&lt;br&gt;
In this way, LIAPP users can expect to increase efficiency and save resources for developing and running mobile apps by protecting essential logic and app without having to do a high and challenging task such as setting up encrypted logic, applicable system, and managing keys safely.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;» Pure bundle file&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa0zia17wduz8zef04642.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa0zia17wduz8zef04642.png" alt=" " width="800" height="237"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;» Protected bundle file with LIAPP&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2wiefvtj6fidgl0rgrmo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2wiefvtj6fidgl0rgrmo.png" alt=" " width="800" height="238"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;As you can see, LIAPP’s React Native Protection feature and LIAPP’s Anti-tampering, Anti-dumper, Memory protection, and Root detection features will protect package files which app service needs a standard security package file.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;LIAPP, we provide the best service possible.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>ANDROID APP SIGNING &amp; ZIPALIGN</title>
      <dc:creator>LIAPP</dc:creator>
      <pubDate>Thu, 09 Feb 2023 05:53:32 +0000</pubDate>
      <link>https://dev.to/teamliapp/android-app-signing-zipalign-5c98</link>
      <guid>https://dev.to/teamliapp/android-app-signing-zipalign-5c98</guid>
      <description>&lt;p&gt;Android apps can be created using a variety of programming language and development programs.&lt;br&gt;
These Android apps are distributed through various channels and are installed on Android devices.&lt;/p&gt;

&lt;p&gt;In order to build a completed Andrioid apps, a signing procedure is required to identify the app creator.&lt;/p&gt;

&lt;p&gt;Usually, the development program does this automatically, so no extra work is needed. However, if you apply security services such as LIAPP to an app, the app package will change, and you will have to sign it manually.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6e2f4t6sohnkmbo4jpw4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6e2f4t6sohnkmbo4jpw4.png" alt="Image description" width="800" height="356"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Signing with jarsigner&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You can sign the Android app using either apksigner or jarsigner.&lt;br&gt;
Apksigner is a tool provided by Android SDK Build Tools of version 24.0.3 and later and can only be signed on apk files.&lt;br&gt;
Jarsigner is a tool included in Java that can be signed both apk and an aab(Android App Bundle) files.&lt;/p&gt;

&lt;p&gt;In this post, we will be specifically covering how to sign with jarsigner.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Preparations&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;JAVA ( jarsigner )&lt;/li&gt;
&lt;li&gt;Key file ( .keystore or .jks )&lt;/li&gt;
&lt;li&gt;Alias and PassPhrase (password) that were set when key file was created&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;p&gt;Jarsigner can be simply used by entering command lines in the form presented below on programs such as cmd in Windows or terminal in Mac.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;[ APK ]&lt;br&gt;
jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore "KEYSTORE_PATH" "APP_FILE_PATH" "ALIAS_NAME"&lt;br&gt;
[ AAB ]&lt;br&gt;
jarsigner -verbose -sigalg SHA256withRSA -digestalg SHA-256 -keystore "KEYSTORE_PATH" "APP_FILE_PATH" "ALIAS_NAME"&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;What we need to focus on here is the part marked with double quotation marks (").&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;[ KEYSTORE_PATH ]&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enter the path to the keystore.&lt;/li&gt;
&lt;li&gt;Usually, it has an extension of .keystore or .jks.&lt;/li&gt;
&lt;li&gt;How to check the keystore in Android Studio
Build Menu =&amp;gt; Generate Signed Bundle / APK =&amp;gt; Select Android Aab Bundle or APK =&amp;gt; Check Key store path&lt;/li&gt;
&lt;li&gt;How to check keystore from Unity
File Menu =&amp;gt; Build Settings =&amp;gt; Player Settings =&amp;gt; Publishing Settings =&amp;gt; Check the Path=&amp;gt; Check the location of a file with the identified name
[ APP_FILE_PATH ]&lt;/li&gt;
&lt;li&gt;Enter the path to the app file you wish to sign.
[ ALIAS_NAME ]&lt;/li&gt;
&lt;li&gt;Enter the Alias name created when you created the key.&lt;/li&gt;
&lt;li&gt;How to check Alias from Android Studio
Build menu =&amp;gt; Select Generate Signed Bundle / APK =&amp;gt; Select Android Aab Bundle or APK =&amp;gt; Check Key alias&lt;/li&gt;
&lt;li&gt;How to check Alias from Unity
File Menu =&amp;gt; Build Settings =&amp;gt; Player Settings =&amp;gt; Publishing Settings =&amp;gt; Check Alias&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;p&gt;A message to enter the password for the keystore will appear once you proceed a command.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Enter Passphrase for keystore:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;When typing the keystore password, the password characters will not be displayed on the screen, but are actually entered.&lt;br&gt;
In the case where incorrect password is entered, an error message as show below will appear.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;jarsigner error: java.lang.RuntimeException: keystore load: Keystore was tampered with, or password was incorrect&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Once the correct keystore password has been entered, you will proceed to the next step.&lt;br&gt;
If the keystore password and key password are identical, the signing will proceed immediately.&lt;br&gt;
If the keystore password and key password are different, you will be prompted to enter the key password.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Enter key password for ALIAS_NAME:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Once the correct key password has been entered, signing will proceed and "jar signed." will be displayed when the siging is completed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsch8hgz5ttakiw0aolcp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsch8hgz5ttakiw0aolcp.png" alt="Image description" width="796" height="282"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the command line, the -storepass and -keypass options allow you to specify and execute passwords in advance.&lt;br&gt;
If you use this option, a message to enter the password will be not displayed; instead, password will be automatically entered.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;[ APK ]&lt;br&gt;
jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore -storepass [Keystore_password] -keypass [Key_password] "KEYSTORE_PATH" "APP_FILE_PATH" "ALIAS_NAME"&lt;br&gt;
[ AAB ]&lt;br&gt;
jarsigner -verbose -sigalg SHA256withRSA -digestalg SHA-256 -keystore -storepass [Keystore_password] -keypass [Key_password] "KEYSTORE_PATH" "APP_FILE_PATH" "ALIAS_NAME"&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Occasionally, there is a case when receiving an error message although a valid password has been entered.&lt;br&gt;
In this case, you should first check whether the keystore or Alias information is entered correctly.&lt;br&gt;
Errors can also occur if the file name and path contain spaces or special characters.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;APK zipalign&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;APK files that have been signed with jarsigner require further sorting using zipalign.&lt;br&gt;
There are no problems with installation and execution without zipalign, but it may fail when registering with the App Market for distribution.&lt;br&gt;
For AAB files, there is no official guide to zipalign, so it is not required.&lt;/p&gt;

&lt;p&gt;You can run the command line in the form below for zipalign.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;zipalign -f -v 4 "apk file Path that needs zipalign" "apk file Path that will be saved after zipalign-ing "&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpl1hz4zjoixlp5dbtm3l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpl1hz4zjoixlp5dbtm3l.png" alt="Image description" width="796" height="170"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Signing &amp;amp; zipalign with script file&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So far, we've learned how to sign and zipalign manually.&lt;br&gt;
The script file below is a sample script that will make signing and zipalign easier.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;[ script for windows ]&lt;br&gt;
[ script for MAC ]&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Please see details below for your information using sample script.&lt;br&gt;
Open the downloaded file in Notepad or Text Editor, modify it based on the contents below, and save the file.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;KeyStorePath=" Keystore path "&lt;br&gt;
ALIAS_NAME="alias name"&lt;br&gt;
STORE_PASS=" Keystore Password"&lt;br&gt;
KEY_PASS="Key password"&lt;br&gt;
ZIP_ALIGN="zipalign File Path"&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The zipalign file is located in build-tools in the path where Android SDK is installed.&lt;br&gt;
If you want to enter your own password without saving it, the -storepass and -keypass related options need to be removed.&lt;/p&gt;

&lt;p&gt;Windows users can drag the app file to be signed to the LIAPP_sign_window.bat file and it will run immediately.&lt;br&gt;
MAC users can run a terminal program either by dragging script files and app files in order, or entering paths as shown below.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Ex. /Users/username/Downloads/LIAPP_sign_mac.sh /Users/username/AndroidStudioProjects/MyApplication/app/release/app-release.apk&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flmfr18rkiv1w3ppv45z4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flmfr18rkiv1w3ppv45z4.png" alt="Image description" width="697" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When running normally, contents such as \bs"signing: path/file" will be displayed and "&lt;strong&gt;jar signed&lt;/strong&gt;." will be displayed when completed. If "&lt;strong&gt;jar signed&lt;/strong&gt;." does not appear and an error occurs, check the relevant information and close the window. After that, take action on the error and re-run it. If the script has no problem running normally, contents such as "&lt;strong&gt;signing: path/file&lt;/strong&gt;" will be displayed and "&lt;strong&gt;jar signed&lt;/strong&gt;." will also appear once completed.&lt;br&gt;
If an error appears rather than "jar signed.", check the related information provided and close the window.&lt;br&gt;
Then, take action on the error and run it again.&lt;br&gt;
Errors can also occur if the file name and path contain spaces or special characters.&lt;/p&gt;

&lt;p&gt;APK files must be signed first and then zipaligned.&lt;br&gt;
If the message "&lt;strong&gt;jar signed&lt;/strong&gt;." has been confirmed without any issues during the signing process, press any key to proceed with the next zipalign steps.&lt;br&gt;
A message with "&lt;strong&gt;Verification succesful&lt;/strong&gt;" will be shown if zipalign is successfully completed.&lt;br&gt;
The zipalign completed file is saved with _zipaligned following the file name.&lt;/p&gt;

&lt;p&gt;For more information on signing and zipalign using jarsigner, please refer to the URL below.&lt;/p&gt;

&lt;p&gt;jarsigner : &lt;a href="https://docs.oracle.com/javase/8/docs/technotes/tools/windows/jarsigner.html" rel="noopener noreferrer"&gt;https://docs.oracle.com/javase/8/docs/technotes/tools/windows/jarsigner.html&lt;/a&gt;&lt;br&gt;
app-signing : &lt;a href="https://developer.android.com/studio/publish/app-signing" rel="noopener noreferrer"&gt;https://developer.android.com/studio/publish/app-signing&lt;/a&gt;&lt;br&gt;
zipalign : &lt;a href="https://developer.android.com/studio/command-line/zipalign" rel="noopener noreferrer"&gt;https://developer.android.com/studio/command-line/zipalign&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;LIAPP, we provide the best service possible.&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>productivity</category>
      <category>design</category>
      <category>chatgpt</category>
    </item>
  </channel>
</rss>
