<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Android on YaxyZ's Blog</title><link>https://yaxyz.sh/tags/android/</link><description>Recent content in Android on YaxyZ's Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 15 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://yaxyz.sh/tags/android/index.xml" rel="self" type="application/rss+xml"/><item><title>Salvador Stealer Analysis</title><link>https://yaxyz.sh/posts/salvador-stealer-analysis/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://yaxyz.sh/posts/salvador-stealer-analysis/</guid><description>The Salvador infostealer is an Android malware designed to intercept Indian banking credentials and OTP Tokens by hooking into the device web rendering engine.</description></item><item><title>The 'Red Alert' Urgent Phishing Campaign: Analysis of an Iranian-Linked Android Infostealer</title><link>https://yaxyz.sh/posts/the-red-alert-urgent-phishing-campaign_-analysis-of-an-iranian-linked-android-infostealer/</link><pubDate>Wed, 11 Mar 2026 00:00:00 +0000</pubDate><guid>https://yaxyz.sh/posts/the-red-alert-urgent-phishing-campaign_-analysis-of-an-iranian-linked-android-infostealer/</guid><description>This article reveals the static analysis of a malicious android app pretending to be &amp;#39;Red Alert&amp;#39;, an Israeli open source early missile warning app. The trojanized application acts as an infostealer, utilizing wrappers, java reflection, and string obfuscation to hide its core functionality.</description></item></channel></rss>