Android, a bug affects more than a billion smartphones: the risks


The Norwegian cybersecurity company Promon raises the alarm: all devices with Android 9 Pie or previous are vulnerable due to a bug which allows a hacker to steal practically all the data on the phone. The vulnerability was reported to Google, which classified it as CVE-2020-0096, but Promon baptized her StrandHogg 2.0 and nicknamed “the twin of the devil“.

This is because StrandHogg 2.0 is very similar to the vulnerability, always discovered by Promon in 2019, strandhögg. In fact, it is an evolution and exceeds its limits. The risks arising from StrandHogg 2.0 are very high and the user has practically no way of realizing that an app that uses StrandHogg 2.0 is stealing his data. This is because the app in question can pretend to be another app and can literally make fun of the user when he thinks he is doing something to protect himself: deny authorization to access the GPS, data, camera, microphone and all other major components of the smartphone. An app programmed for take advantage of StrandHogg 2.0, therefore, plays with cunning and this makes it very difficult to identify it. And consequently protect yourself.

How StrandHogg 2.0 works

Because of StrandHogg 2.0 of the Malicious apps can freely take on the appearance of legitimate apps while remaining completely hidden. By exploiting this vulnerability, a malicious app installed on a device can attack and deceive the user so that when clicking on the icon of a legitimate app, a fake version is displayed instead of the original one. At this point, the user believes he is using a legitimate app and enters his login credentials, but this sensitive data is immediately sent to hackers.

Another attack strategy possible thanks to StrandHogg 2.0 provides the authorization request. If the user grants them, he can use the legitimate app, if he denies them, he will actually give them to the hacker, and then be redirected to the legitimate app. In this way it is practically impossible to notice what happened.

How to defend yourself from StrandHogg 2.0

First of all, remember that I am only devices with Android 9 or earlier are vulnerablewhile those with Android 10 are safe. Then you need to immediately download and install the Android security updates from May, where Google added the patch to correct the problem. In fact, Promon informed Google of the vulnerability on December 4, 2019, giving Big G more than reasonable time to release the patch. And so it was: Google has released a patch for the partners of the Android ecosystem in April 2020, and a security patch for Android 8.0, 8.1 and 9 available for all users which is already available at this address.

Source link


Please enter your comment!
Please enter your name here