Bluetooth and WiFi (Electromagnetic) Analyzer Tool

Detect Electromagnetic signals from Bluetooth or WiFi devices

There are available Bluetooth and separate WiFi Analyzers, this tool combine both functions. This tool is developed as an educational tool to find devices emitting electromagnetic (EM) signals.



For both Bluetooth and WiFi, range or distance is dependent on line of sight.
BT Range: Bluetooth 2.1 and Bluetooth 4 devices can be detected up to a theoretical range of 100 meters. Bluetooth 5 devices can be detected up to a theoretical range of 400 to 1000 meters. Range is dependent on environment such as presence of obstacles.

WiFi Range: 2.4 GHz band devices can be detected up to a theoretical range of around 45 meters. 5 GHz band devices can be detected up to a theoretical range of around 20 meters. Devices using 802.11n standard can be detected up to a theoretical range of around 50 meters. 

Features:
➤ Low Cost, No Ads and No Root required
➤ Simple to use
➤ Supports smartphone, Tablets, Generic Android™ TV Boxes
➤ Supported and tested on Android™ Lollipop, Marshmallow, Nougat, Oreo, Pie
➤ Good resource management
➤ No frills, run with minimum RAM and CPU
➤ No unnecessary function and permission
➤ Safe and Privacy focused, no servers and does not connect to the Internet
➤ Save and scan your favorite devices
➤ Find devices using Bluetooth or WiFi
➤ Find misplaced or lost equipment such as smart watch, smartphone, Bluetooth speakers, Bluetooth headset, Bluetooth car kits, ...
➤ Find Ofo bicycles - Address is "ofo"
➤ Find Mobike bicycles - Address start with "mb_"
➤ Find oBike bicycles - Address start with "bike:"

Explanation: Higher RSSI means closer to you, e.g. a device with RSSI -60 is closer to you than a device with RSSI -78.

Bluetooth Devices are named with a "B:" in front of the MAC address.
WiFi Devices are named with a "W:" in front of the MAC address.

Note: Constant prolong usage of Bluetooth or WiFi (more than an hour each time) will drain your device battery faster and lead to long term deterioration of battery life. 



Updated App - Quick Check for RottenSys, APT-C-23, AsiaHitGroup and Other Trojan Malware

Get it here

Quick check and scan for RottenSys, Trojan.AsiaHitGroup, Trojan.SMS.AsiaHitGroup, Adware.AsiaHitGroup, APT-C-23 (Dardesh, VokaChat, Chattak) malware files in your Phones, Tablet, TV.


Features:

➤ Free
➤ No root required
➤ Simple to use, start scan when app is started
➤ Supports smartphone, Tablets, TV box
➤ Good resource management
➤ No frills, run with minimum RAM and CPU
➤ Supports Android Jelly Bean onwards, KitKat, Lollipop, Marshmallow, Nougat
➤ Safe and Privacy focused, no servers and does not connect to the Internet
➤ No unnecessary function and permission
➤ RottenSys malware is linked to Ads so for peace of mind this app is free of ads

This apk is uploaded to VirusTotal - see results in https://www.virustotal.com/#/file/87c786eaa4ae2755c6f98c31b47d22138672a6ce05357eb200fa9f53fe4d9fbe/detection

For more details on RottenSys:
- https://research.checkpoint.com/rottensys-not-secure-wi-fi-service/
- https://www.2-viruses.com/rottensys-malware-phones

For more details on Trojan.AsiaHitGroup, Trojan.SMS.AsiaHitGroup, Adware.AsiaHitGroup:
- https://blog.malwarebytes.com/cybercrime/2017/11/new-trojan-malware-discovered-google-play/

 For more details on APT-C-23 (Dardesh, VokaChat, Chattak):
- https://www.zdnet.com/article/fake-android-apps-used-for-targeted-surveillance-found-in-google-play/


If a malware is detected, just go to setting/Applications and remove it.
In the unfortunate event that the malware cannot be deleted, you can email fledevstaff@gmail.com and we will try to help.





Get it here

How to Keep Your Android Phone, Tablet and TV Secure

Some useful tips and advice on keeping your Android devices, Phone, Tablet, TV, safe and secure.


  • Keep your device always up-to-date with the firmware/ROM update when available
  • If your android phone is of a older model than two years or not updated to a newer version in a long time, then it may be time to change your phone
  • Never install applications from 3rd-party market place or stores
  • Ensure that Google Play Protect is turned on
  • Ensure 'Verify Apps' feature from settings is turned on
  • Ensure "Unknown sources" from settings is turned off
  • Ensure your phone is regularly backed up, or sync your contacts/data/etc with one of the major companies such as Google, Samsung
  • Never open documents that you are not expecting, even if it looks like it's from someone you know
  • Protect your devices with pin or password lock so that nobody can gain access to your device when device is lost
  • Regularly download a major anti-virus application from Google Play Store and scan your device. You can uninstall the program if you do not want to keep the anti-virus program. 

Recommended applications are:

  1. AVG
  2. Bitdefender
  3. Avast
  4. Kaspersky
  5. Norton
  6. Malwarebytes



A Trojan with Hidden Malicious Code Steals User’s Messenger App Information

A Trojan with Hidden Malicious Code Steals User’s Messenger App Information


A new Android malware is discovered to steal data from mobile instant messaging clients, such as Facebook Messenger, Skype, Telegram, Twitter, WeChat, Weibo, Viber, Line, Coco, BeeTalk, Momo, Voxer, Walkie Talkie Messenger, Gruveo Magic Call and TalkBox Voice Messenger.

Malware was spotted inside a Chinese app with the name "com.android.boxa".

This Android malware single function is to extract and exfiltrate user IM data, possibly for future extortion attempts.

Get it here to scan your mobile, tablet or AndroidTV.