Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Piracy Android Software The Internet Technology

Stolen Android Anti-Piracy Software Dumped On Github (torrentfreak.com) 33

Dexguard, a tool used to protect Android software from piracy, tampering and cloning attacks, has been removed after being illegally posted on Github. A version of the tool exposed on the code repository was stolen from a customer of Guardsquare, the software's creator. TorrentFreak reports: "We develop premium software for the protection of mobile applications against reverse engineering and hacking," the [security company Guardsquare's] website reads. "Our products are used across the world in a broad range of industries, from financial services, e-commerce and the public sector to telecommunication, gaming and media." One of Guardsquare's products is Dexguard, a tool to protect Android applications from being decompiled, something that can lead to piracy, credential harvesting, tampering and cloning. Unfortunately, a version of Dexguard itself ended up on Github.

In a takedown notice filed with the Microsoft-owned code platform, Guardsquare explains that the code is unauthorized and was obtained illegally. "The listed folders... contain an older version of our commercial obfuscation software (DexGuard) for Android applications. The folder is part of a larger code base that was stolen from one of our former customers," Guardsquare writes. Guardsquare found almost 300 "forks" of the stolen software on Github and filed a request to have them all taken down.

This discussion has been archived. No new comments can be posted.

Stolen Android Anti-Piracy Software Dumped On Github

Comments Filter:
  • Polly wanta crack it? Arrrghh! There yea go my maties! We have the secret codes.
  • Same snake oil as all other Digital Restriction Management: Send a list of commands containing an encrypted "secret" to an untrusted party (the user), send him the key too, and expect him to just tell his CPU to follow those commands blindly... which, somehow, *magically* keeps the "secret" secret from the user. Like even the biggest n00b couldn't just find at simple tool or a friend and a more advanced tool, to tell *his* CPU, to do something else... like tell the user the "secret".

    Seems like they don't ha

  • Fuck them (Score:2, Insightful)

    by spire3661 ( 1038968 )
    "We develop premium software for the protection of mobile applications against reverse engineering"

    No sympathy for scum like this.
  • by Anonymous Coward

    Does anyone still use DexGuard after they jacked the price model up to 'however much we think your app is worth'?

    Seriously, that kind of pricing scheme can basically 'fuck off' (We used to be a customer, and went to using dexprotector once guardsquares pricing scheme went that way).

    We actually go out of our way to not do business with any other company either with that kind of ass-holish pricing model. I know it's fairly common in places like the US, but, seriously, put prices with actual numbers online an

  • by ffkom ( 3519199 ) on Sunday August 19, 2018 @05:55PM (#57156502)
    The features that are advertised for Dexguard sound like exactly what Malware programmers would be looking for to obfuscate their evil intentions. Spyware, Trojans, Adware and the like are certainly right in the middle of the target audience.
    • and this is why some (defunct imo) AV products have flagged executable packers for as long as i can remember. I have used a modified (header only) version of UPX for some products over the years, and time and time again, some AV will flag it as some generic virus. The reason I used it was to make it a little harder for script kiddies to clone the product, as just changing the UPX header would be enough to disable the generic unpacker scripts. It's gotten even worse in recent years, where a simple (un-obfusc
    • by Anonymous Coward

      Dude, chill and don't be so quick to judge. Personally I do prefer my banking application to be harder to reverse-engineer. You know ...against hackers ?

      I don't know how many hackers and evil corporations this company has helped but the CTO/founder is the same guy who wrote proguard many years ago. If you haven't heard of proguard - it is a free (GPL) piece of software used to shrink Java byte code. It is included in every Android SDK installation and launched automatically during the appli

You know you've landed gear-up when it takes full power to taxi.

Working...