New Unpatched Strandhogg Android Vulnerability Actively Exploited in the Wild

android task hijacking attacks

Cybersecurity researchers have discovered a new unpatched vulnerability in the Android operating system that dozens of malicious mobile apps are already exploiting in the wild to steal users’ banking and other login credentials and spy on their activities.

Dubbed Strandhogg, the vulnerability resides in the multitasking feature of Android that can be exploited by a malicious app installed on a device to masquerade as any other app on it, including any privileged system app.

In other words, when a user taps the icon of a legitimate app, the malware exploiting the Strandhogg vulnerability can intercept and hijack this task to display a fake interface to the user instead of launching the legitimate application.

By tricking users into thinking they are using a legitimate app, the vulnerability makes it possible for malicious apps to conveniently steal users’ credentials using fake login screens, as shown in the video demonstration.

“The vulnerability allows an attacker to masquerade as nearly any app in a highly believable manner,” the researchers said.

“In this example, the attacker successfully misleads the system and launches the spoofing UI by abusing some task state transition…

http://feedproxy.google.com/~r/TheHackersNews/~3/X_Pbesx8Yjw/strandhogg-android-vulnerability.html

Have a comment? Type it below!