An important Android flaw can be used to hack almost any phone: What to Do

An important Android flaw can be used to hack almost any phone: What to Do

If your Android phone can install Google's May security update, be sure to run the update [The critical vulnerability, dubbed Strandhogg 20, which was revealed yesterday (May 26), can be used to "access private SMS messages and photos, steal victims' login credentials, track GPS movements, track phone conversations and spy on them through the phone's camera and microphone

Strandhogg 20 superficially resembles the previous Strandhogg Android flaw that Promon released in December 2019 Both Strandhogg (the name comes from a Viking term meaning coastal raid) let malware disguise legitimate Android apps and system screens

As a result, the Facebook username and password might be entered into a fake Facebook app instead of the real one, handing control of the Facebook account to the attacker (unless two-factor authentication is enabled) Or you might give the attacking app permission to use your camera and microphone, allowing it to spy on you

The good news is that Android 10 phones are not affected by Strandhogg 20, and Android 80 and 81 Oreo and Android 9 Pie were patched with a security update in early May Also, the flaw has not yet been exploited, but that could change soon

The bad news is that many phones that are not Google Pixels or Samsung flagship models will not receive the May security patch for several months older phones running earlier versions of Android will likely will likely never be patched

Both versions of Strandhogg can be exploited without taking app permissions, so there will be little to inform phone users that something might be wrong The first Strandhogg, however, can be easily detected using Google's own Play Protect software

Strandhogg 20 is not Malware that exploits it may get past even the best Android antivirus apps A perfectly harmless app might later be updated to exploit Strandhogg 20 and fool Google Play

Promon researchers notified Google of the Strandhogg 20 flaw on December 4, 2019, and Google confirmed the severity of the flaw five days later However, it took Google nearly five months to fix the vulnerability, and Promon gave Google a break by extending the 90-day disclosure deadline twice

Categories