Security vulnerabilities threaten more than 1 billion Android smartphones
Norwegian security experts have discovered a serious security vulnerability called Strandhogg (CVE-2020-0096) that affects the Android operating system, allowing hackers to deploy various types of attacks with fake forms. different appearance. First discovered in late 2019, Strandhogg has been successfully deployed by a number of attackers on a victim's machine to steal banking information and multiple login accounts, and track activity on the device.
With the new name of Standhogg 2.0, this new security flaw affects most devices running Android, except for devices running the latest version of Android 10 (Android Q). However, the platform is only available on about 15-20% of all devices using Google's mobile operating system worldwide, which means there are over 1 billion devices capable of being exploited.
Strandhogg 1.0 exists in Android's multi-tasking feature, while version 2.0 is essentially a privilege flaw that allows hackers to gain access to most applications available on the device.
When the user touches the icon of any legitimate application on the device, the malware will exploit the Strandhogg vulnerability to block and hack this operation to show a fake interface to the user instead of opening the application. real use.
Strandhogg 1.0 can only attack one application at a time, while 2.0 allows hackers to actively attack almost every software available on the device with a single touch and requires no preconfiguration for each. target program.
According to THN , Strandhogg 2.0 contains many dangers and worries because the victim is almost unable to detect the attack. This vulnerability is able to hack and tamper with the interface of almost any application present on the device without configuration, used to require all permissions on the device. Besides, version 2.0 can be used on all Android devices (except for Android 10) without requiring root access and does not require any permission to operate.
In addition to stealing account information, malware can increase the level of danger by deceiving users to grant sensitive access on the device when posing as a legitimate application.
'Hackers can take advantage of Strandhogg 2.0 to gain access to messages, private photos, steal account logins, track GPS activity, make or record calls or track through Camera and microphone of the phone. Meanwhile, anti-virus programs or security scanners are difficult to detect malicious applications to give warnings to users', the research team said.
5 ★ | 1 Vote
You should read it
- How to enable Full-Disk Encryption on Windows 10?
- Top 10 brilliant hackers
- Enhance security for Mac operating system
- Awareness and experience - the most important factor in every network security process
- Microsoft's private GitHub repository was hacked
- Guidelines for securing computer network systems
- Top 20 best encryption software for Windows
- The cybersecurity tools that every business should know
May be interested
- 9 misconceptions about security and how to resolvealmost every recent study of security vulnerabilities has come to the same conclusion: people are more risky factors for a business than technology gaps.
- Security vulnerabilities - basic insightssoftware vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
- New vulnerability on MediaTek chip makes 30% of Android smartphones can be eavesdroppedmediatek has just had to immediately release patches for vulnerabilities that allow hackers to eavesdrop on android users' calls. even hackers can exploit the vulnerability to run commands or privilege escalation attacks.
- Fortnite for Android has a security vulnerabilitysecurity experts at google have discovered a security hole in epic games' fortnite game installer. by taking advantage of an application using an external memory system to store data, hackers can invade the device to download and install malware.
- The NSA identifies 4 'critical' security vulnerabilities of cloud systemsthe us national security agency (nsa) has issued a new guide to help organizations and businesses improve the security of data stored on the cloud.
- 5 common errors in managing security vulnerabilitiesin the eyes of some people the issue of managing vulnerabilities is considered one of the intensive security management activities. there are others who think this is just a necessary process that microsoft has to make
- How to scan websites for potential security vulnerabilities with Vega on Kali Linuxresisting a hacker attack is one of the most important responsibilities a system administrator must perform. therefore, it is important for a system administrator to take proactive measures to find and fix vulnerabilities in their websites.
- How to identify compatible smartphones with Android watchesbefore ordering a new android wear smart watch to appear on the market, check to make sure that the cricket or android tablet i am using will work together with the toy. new technology.
- The Mail app on iOS has serious vulnerabilitiessecurity researchers at zecops have discovered two serious vulnerabilities that exist on the default mail application pre-installed on millions of iphones and ipads.
- 6 enterprise security holes to notehere are six security vulnerabilities that are often expanded, even companies that are proud of their security precautions.