A new Android vulnerability has been exposed by the “Promon Security Researchers,” called ‘StrandHogg,’ which allows the malware to act as legitimate apps. Firstly, approx 36 malicious apps are exploiting the android operating system incl of the latest Android 10. Secondly, this vulnerability allows malicious apps to commandeer any genuine apps and ask them to perform malicious operations.
Report from Promon Security Researches says, The StrandHogg vulnerability is quite sneaky because “it does all the advanced attacks even if the device is not rooted, which raises the question then How?“. It uses an Android OS weakness in a multitasking system that allows the application to disguise as any other app present on the handset.
Below is the list of the task the hackers can perform with the malicious apps:
This Android Vulnerability is “based on Android Control Setting, taskAffinity. It allows any app to disguise its identity to any app on the device freely, they desire”. Moreover, this is an OS-level vulnerability that hasn’t been fixed by Google in any versions of their Android OS to date. Sadly all Android devices are exposed to this security flaw.
Although, Provon hasn’t listed any of those apps but mentions that none of them are available for download via the PlayStore.
This website uses cookies.
Read More