BSides Cape Town 2025

Dr Roboto

With a decade embedded in the financial sector’s digital trenches, [Redacted] has analysed malware strains, reverse-engineered adversarial code, and profiled threat actors operating in the shadows of global finance. Armed with a PhD in Signals Intelligence, they’ve traced lateral movement across compromised networks and developed behavioural fingerprints of Advanced Persistent Threat (APT) groups. Their work bridges the gap between deep technical analysis and real-world adversary tracking


Session

12-06
10:30
45min
From Impersonation to Exploitation: A look at Mobile Malware Campaigns
Brent Shaw, Dr Roboto

Mobile malware is no longer a fringe concern—it’s a fast-evolving threat that quietly compromises users across the globe. This session dives into two years of malware investigations, revealing how attackers exploit social engineering and impersonate trusted Android apps to gain full control of devices. Through a case study, we expose the inner workings of a repackaged RAT campaign and the critical phases of its attack: Delivery, Enablement, and Exploitation.

Attendees will gain insight into how threat actors manipulate Android Accessibility Services, bypass user defences, and adapt their tactics in response to improved detection. While not directly targeting South African institutions, the campaign’s techniques pose real risks to financial applications and user privacy. This talk offers insights into mobile malware campaigns and highlights the urgent need for collaboration, education, and smarter defences in the mobile threat landscape.

Track 1