The StrandHogg vulnerability is mostly infected the android OS without accessing root mode and use vulnerability based on weakness seen.
Promon security researchers have found proof of a dangerous Android vulnerability named 'StrandHogg’, that allows real-life malware to pose as legitimate apps, with users unaware they are being targeted.
What’s the impact?
- All versions of Android affected, including Android 10*
- All top 500 most popular apps are at risk still we are still not listed how many apps are vulnerable
- Real-life malware is exploiting the vulnerability
- Till now 36 malicious applications exploiting the vulnerability was identified
- The main thing is vulnerability can be exploited without root access
- When exploited by hackers
- They can listen to the user or victim through the microphone
- Take photos through the camera and view the mobile screen.
- Read and send important SMS messages they will take control without the knowledge of the victims
- Make and/or record phone conversations with victims knowledge
- Phishing login credentials by watching the mobile screen
- Get access to all private photos and files on the device and may be use to gain from information gathered.
- Get location and GPS information and target the victims.
- Get access to the contacts list and miss use or sell at dark web
- Access phone logs and modify everything.
How to identify or avoid from this virus:
- Check the mobile access or permission to applications
- Please avoid the application which are asking for permission or ask to download.
- Check whether without your knowledge any apps installed.
Beware of virus and Malwares. Use your end devices securely.