Android Phishing Analysis with the Reverse Engineering Method Using MT Manager

##plugins.themes.academic_pro.article.main##

Ika Mei Lina
Gilang Ryan Fernandes

Abstract

People spend a lot of time with gadgets every day, and it cannot be denied that gadgets can facilitate people's activities in various fields. However, even though gadgets are very helpful, there are digital crimes that we must be aware of. One case that has received a lot of attention is the method of providing online invitations and package delivery receipts in the form of malware spread via the WhatsApp chat application. This has caused many losses, such as losing money in banking and also confidential data being accessed by criminals. The aim of this research is so that the public can anticipate this crime. Researchers use the Reverse Engineering method to find out the process, patterns, design, and how a program works in detail. The results obtained from this research are that there are many hacker attacks in the form of malware applications. This malware application will run when the victim downloads, installs, and grants access permission to the application. So people should always be alert and careful when using gadgets in everyday life.

##plugins.themes.academic_pro.article.details##

How to Cite
Ika Mei Lina, & Gilang Ryan Fernandes. (2024). Android Phishing Analysis with the Reverse Engineering Method Using MT Manager. Jurnal E-Komtek (Elektro-Komputer-Teknik), 8(1), 137-143. https://doi.org/10.37339/e-komtek.v8i1.1677

References

Pendidik. Tambusai, vol. 5, no. 1, pp. 1689–1695, 2021, [Online]. Available: https://jptam.org/index.php/jptam/article/view/1162?articlesBySameAuthorPage=2
[2] A. Dermawan, “Urgensi Perlindungan Hukum Bagi Korban Tindak Pidana Kejahatan Teknologi Informasi,” J. Sci. Soc. Res., vol. 4307, no. 2, pp. 39–46, 2019, [Online]. Available: http://jurnal.goretanpena.com/index.php/JSSR
[3] A. C. Wardaya, “Akibat Hukum Bug Hunter yang Melakukan Illegal Access Terhadap Aplikasi,” vol. 3, pp. 2274–2285, 2023.
[4] M. Ziadia, J. Fattahi, M. Mejri, and E. Pricop, “Smali+: An operational semantics for low-level code generated from reverse engineering android applications,” Inf., vol. 11, no. 3, 2020, doi: 10.3390/info11030130.
[5] A. S. Gulo, S. Lasmadi, and K. Nawawi, “Cyber Crime dalam Bentuk Phising Berdasarkan Undang-Undang Informasi dan Transaksi Elektronik,” PAMPAS J. Crim. Law, vol. 1, no. 2, pp. 68–81, 2021, doi: 10.22437/pampas.v1i2.9574.
[6] M. H. Wibowo and N. Fatimah, “Ancaman Phishing Terhadap Pengguna Sosial Media Dalam Dunia Cyber Crime,” JOEICT(Jurnal Educ. Inf. Commun. Technol., vol. 1, no. 1, pp. 1–5, 2017, [Online]. Available: https://www.jurnal.stkippgritulungagung.ac.id/index.php/joeict/article/view/69
[7] Fatmawati and Raihana, “Analisis Yuridis Terhadap Artificial Intelligence Pada Tindak Pidana Penyebaran Malware Di Indonesia,” Innov. J. Soc. Sci. Res., vol. 3, no. 20, pp. 12190–12201, 2023.
[8] E. Maiyana, “Pemanfaatan Android Dalam Perancangan Aplikasi Kumpulan Doa,” J. Sains dan Inform., vol. 4, no. 1, pp. 54–65, 2018, doi: 10.22216/jsi.v4i1.3409.
[9] M. Manager, “Official MT Manager Pro Apk Download for Android - MT Manager Apk.” https://mtmanager.app/ (accessed Feb. 22, 2024).
[10] A. T. Hidayat, R. Rio, and I. G. O. Santosa, “Membershipplication Berbasis Android Dengan Penerapan Kotlin Programming Language Di Wijaya Fitness Center (Wfc),” JUSIM (Jurnal Sist. Inf. Musirawas), vol. 8, no. 1, pp. 8–15, 2023, [Online]. Available: https://jurnal.univbinainsan.ac.id/index.php/jusim/article/view/1952