Sunday, November 17, 2024
HomeAndroidStrandHogg - Hackers Aggressively Exploiting New Unpatched Android OS Vulnerability in Wide...

StrandHogg – Hackers Aggressively Exploiting New Unpatched Android OS Vulnerability in Wide Using Malware

Published on

Newly discovered Android vulnerability dubbed “StrandHogg” being exploited in wide by unknown hackers using weaponized malware apps that posed as a legitimate one to perform various malicious activities.

The vulnerability allows attackers to infect the Android phone without root access, and it affects all the android version including Android 10.

Researchers confirmed that 36 malicious apps are exploiting the vulnerability, and the top 500 most used apps are at risk for this vulnerability.

- Advertisement - SIEM as a Service

Dubbed Strandhogg vulnerability in Android OS discovered by Promon, an app protection company that specializing in In-App Protection for both Android and Windows.

Strandhogg vulnerability in the Android allows a malicious app to display an Activity in the UI context of another app. which means, it enables hackers to perform screen overlays attack via malicious banking trojan to gain the apps permission.

Successful exploitation of this Strandhogg vulnerability let hackers perform various malicious operation including listen to the user through the microphone, Phish login credentials, Access phone logs, Get location and GPS information, Make and/or record phone conversations, Read and send SMS messages, Take photos through the camera and more.

Sadly still the vulnerability has not yet been fixed for any version of Android (incl. Android 10).

Attackers mainly infecting Android users via droppers apps distributed via Google Play, Google removed some of the strange apps that posed a threat to Android users, but still, attackers introducing the new dropper apps and downloaders to infect users phone with malware.

How Hackers Exploit The Android Using StrandHogg Vulnerability

At the initial stage of infection, malicious apps that posed a legitimate one requesting to users any sensitive permissions including SMS, photos, microphone, and GPS, allowing them to read messages, view photos and more.

According to Promon research, “The attack can be designed to request permissions which would be natural for different targeted apps to request, in turn lowering suspicion from victims. Users are unaware that they are giving permission to the hacker and not the authentic app they believe they are using.”

If the user clicks the legitimate app, a malicious login page will be displayed in the victim’s screen instead of a legitimate app screen, it lookalike legitimate one to users.

strandhogg
Infection Process

If they entered any sensitive data such as credentials on the screen, it directly sends to the attackers who can then login to, and control, security-sensitive apps, then the normal legitimate screen will have appeared.

” StrandHogg, unique because it enables sophisticated attacks without the need for a device to be rooted, uses a weakness in the multitasking system of Android to enact powerful attacks that allows malicious apps to masquerade as any other app on the device. This exploit is based on an Android control setting called ‘taskAffinity’ which allows any app – including malicious ones – to freely assume any identity in the multitasking system they desire. ” Researchers said.

Attackers dropping malware via several Hostile Downloaders and it hijacks the target’s task. Once the targeted app launched by users, the hijacked task will be brought to the front and the malicious activity will be visible.

Finally, the malicious app pretends to be a legitimate one without letting users know and steal sensitive data from compromised Android devices.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access

CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for...

4M+ WordPress Websites to Attacks, Following Plugin Vulnerability

A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin,...

CISA Warns of Actors Exploiting Two Palo Alto Networks Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert and added...