Strandhogg vulnerability on Android allows malicious code to impersonate every Android application
Security firm Promon recently discovered a new vulnerability, called Strandhogg, that exists in Android's multi-tasking feature. Hackers can take advantage of this vulnerability to create malicious code disguised as any other application on that device, including system applications, to capture user's bank account information and track the behavior of the user. they.
Specifically, the malware that exploits the Strandhogg vulnerability will hide as a legitimate application. When users click on the icon, the malware will intervene and display a fake interface of the real software. This makes users think they are using the real application, making it easier for malicious apps to steal sensitive information from users, eavesdrop on microphones, take remote snaps, record calls . then send them. them to attacker via remote server.
The researchers said the flaw is extremely dangerous because it allows an attacker to impersonate almost all applications and users are almost unrecognizable.
In the video below, an attacker manipulates several task state transition conditions, deceiving the system and booting up a fake interface. When the victim enters personal information, the code immediately sends that information to the attacker, giving him access to any sensitive user account.
Security researchers have discovered at least 36 malicious applications that are exploiting the Strandhogg flaw. One of them is CamScanner, a PDF creation application that has been downloaded over 100 million times. However, the researchers said that there are currently about 500 common applications at risk of being impersonated.
Currently, malware has been removed by Google, but the Strandhogg flaw has not been patched yet.
As recommended by Promon, while waiting for the patch to protect themselves by paying attention to a few small details such as pop-up notifications demanding access but not displaying the application name, the application loves If you are already logged in, the virtual keys (including the back key) and the link (link) do not work when clicking .
- Warning: Operation to attack Vietnamese users through Unikey percussion
- Warning: There appears an email notification of Windows updates from a fake Microsoft that contains cyber ransomware
You should read it
- Warning: Android fake Uber software appears to trick user passwords
- Detecting fake 2FA security apps that can steal bank accounts on Android phones
- 23 malicious apps that steal Facebook and Instagram accounts and blackmail users, need to be removed immediately
- How to identify and avoid fake Android apps in Play Store
- Chrome and Firefox have a serious security flaw, there is no way to fix it
- 151 Android apps that steal money in your account, you should remove it immediately if you accidentally install it
- Detected 172 fake Android apps used to mine coins
- More than 4,000 Android apps reveal user information
May be interested
- Warning: The new Facebook virus, a malicious code that is spreading rapidly through Messengerfrom yesterday (december 18, 2017), a new type of malicious code has appeared and raged in vietnam. this malicious code is not too sophisticated but is spreading very fast through facebook messenger because it is sent from the friends in the friend list.
- Series of Android applications contain malicious code you should remove immediately from your devicecybersecurity researchers have discovered many android apps containing adware and information-stealing malware on the google play store.
- Most Android anti-virus software cannot detect malicious APK filesapk file containing malicious code is a method that hackers often use to attack android users. unlike ios, android users can download and install apps from third-party app stores or download the app's apk file and install it themselves.
- How to detect malicious apps on Androidinstalling applications outside of google play is often potentially risky, making users more likely to steal personal data and money. therefore, the detection of malicious applications on android phones will help you distinguish what will be a safe application, where the application contains malicious code, thereby minimizing the download of dangerous applications. security and protection of android devices become safer.
- Android apps contain malicious code that uses motion sensors to avoid detectionthe sad fact is that after many efforts by google to isolate the play store from malware, malicious applications somehow find new ways to deceive measures. malware prevention ...
- Discovered a group of hackers who use secret code to spy on 21 countriesa group of secret hackers specialized in using android malicious code and other sophisticated reconnaissance tools to steal messages, call history, documents of the press, military, corporation and many other targets at 21 newly discovered country in beirut.
- Many cheap Android smartphones are 'promotional' codes for usersavast has discovered a kind of malware called cosiloon that is included in many cheap android phones that are not certified by google.
- Decode xHelper - the kind of immortal malicious code on Android, still 'alive' after factory resetrecently, researchers at kaspersky labs have discovered the extremely complex operation of xhelper, a new malware that attacks devices running android, capable of surviving even after performing a factory reset. return to original settings.
- Warning: Appeared fake FaceApp application to install malicious code on users' devicesrecently, experts from kaspersky have discovered a fake faceapp application created and used by hackers to steal user data.
- Detecting SharkBot malware hiding in anti-virus applications on Google Playsomehow, the sharkbot anti-virus application has been approved on the google play store.