StrandHogg Bug - For Android User

StrandHogg Bug - For Android User

54°
Maxresdefault
suspended
1,141
1283
16

JUST TWO MINUTE READ GUYS
This BUG can then potentially listen to users conversations, make calls, record conversations, access photo album, read or send messages,as well as get login credentials to various accounts

Method used by attackers:
When a user launches an app, an attacker can condition the system to display to the user a spoofed User Interface (UI) under the attacker’s control instead of the real UI from the original app, without the user’s awareness.
All apps on the user’s device are vulnerable, including the privileged system apps

Dropper apps:
Dropper apps are those that either have or pretend to have the functionality of popular apps, but they also install additional apps to a device that can be malicious or steal data.

What are the safe steps?
Currently, there is no effective block or even detection method against StrandHogg on the device itself. However, as a user, you should be alert to the following discrepancies in your device:
An app or service that you’re already logged into is asking for a login.
Permission popups that do not contain an app name.
Permissions asked from an app that shouldn’t require or need the permissions it asks for. For e.g., a calculator app asking for GPS permission.
Typos and mistakes in the user interface.
Buttons and links in the user interface that does nothing when clicked on.
Back button does not work as expected.

LAST BUT NOT THE LEAST DONT INSTALL ANY APP FOR SOME MOMENTS IF YOU DONT REQUIRE IT , AS IN NEW YEAR TIME PERIOD MANY APPS OFFER GIVES MANY DEAL OR GIVES PREMIUM APPS FOR FREE .
SAFETY FIRST

2 Comments  |  
2 Dimers
Maxresdefault
suspended
1,141
1283
16
nikhilp1 wrote:

Source ?!

MINISTRY OF HOME AFFAIRS

Missing