Technology

How Do the Android Bug, Strandhogg 2.0 Steals User Data From Devices Running Android 9 & Earlier

The Norwegian Security firm has unearthed a new Android security bug dubbed Strandhogg 2.0 that lets the malware to imitate the legitimate apps. The malware thereby steals the app passwords as well as other user sensitive data. The malware is found to affect all the Android devices running Android 9. The research firm reported the same to Google which took necessary steps and fixed the critical rated vulnerability.

The good news is that there is no evidence to approve the usage of the malware in the active hacking campaigns. Strandhogg 2.0 works by tricking the user into thinking that they have been entering the password on a legitimate app which in reality doesn’t happen. The malware can also siphon off other important user-related data like photos contacts and even the victim’s real-time location.

Advertisement

How does the Android security bug, Strandhogg 2.0 Operate?

The new Android malware Strandhogg 2.0 works by abusing the Android multitasking system. It keeps a close watch on every recently opened app wherein the user uses to switch back and forth. The victim is forced to download the malicious app which is disguised as a normal app. Upon installation, the malicious app hijacks the app and introduces malicious content in its place for example a fake login window. The app siphons off the password as soon as the user enters the password on the fake overlay on to hackers’ servers.

Also Read: Foldable Helmets to be Part of Tier’s Electric Scooters

The interesting part is Strandhogg 2.0 also does not require any Android permissions in the first place. It also hijacks the permissions of other apps and gets access to the victim’s contacts, images, and messages. Besides uploading the data, the malicious app can even upload the entire text conversations and defeating the two-factor authentication in the process. As of now, the only thing to avoid the malicious app is to update the Android devices with the latest security updates.

Source

Sekhar. M

Always on the move with the latest happenings in the field of technology and health. When I am not writing, you can find me listening to the latest chartbusters. Also being a sports geek, I always keep a close eye on all the latest happenings.

Share
Published by
Sekhar. M

Recent Posts

78cm Modular Electric Car iEV Z Changes Size as per the Need

iEV motors from Denmark has manufactured a pod-sized 78 cm iEV Z modular electric car.…

3 years ago

Updated Garena free fire redeem codes today new: How to redeem Ff rewards?

Garena free fire - Illuminate is a multiplayer battle royal mobile game. The app is…

3 years ago

Top 11 Ways to Keep Your Brain Healthy and Young

The stressors of adult life can take a serious toll on your brain and make…

3 years ago

Top Men Body Hair Removal Methods-2021

Men often experience a lot of irritation and embarrassment due to the unwanted growth of…

3 years ago

Microservices vs Monolithic architecture, Which is right for your Business?

Web application architecture describes the relationship between servers, databases and applications. All web applications are…

4 years ago

How Mobile Apps are Revolutionizing The Media And Entertainment Industry

Gone are the days when mobile phones come in handy only for voice calling and…

4 years ago