Strandhogg 2.0 steals data by posing as legitimate Android apps

Only Android version 9 and below could be exploited by this new method, but it’s been fixed in the latest Android monthly security patch.

google-pixel-keys-security.jpg?itok=skJC

What you need to know

  • Security researchers have found another exploit similar to the original Strandhogg discovered back in December.
  • This version is more sophisticated, allowing it to pose as a legitimate app that users are putting their passwords into permission hijacking.
  • This exploit does not work with Android 10 and has been patched in the latest Android security fixes.

Looks like Strandhogg is back with an even more evil twin — and this is coming from someone who is an evil twin herself. Strandhogg 2.0, announced today by security researchers, once again tricks users into thinking that they’re putting their passwords into a legitimate app when they’re actually putting it into malware. The exploit is a more sophisticated version of the original Strandhogg exploit found back in December that made users think they were interacting with a legitimate website instead of a malware layer.

This new version only impacted Android 9.0 and below — Android 10 wasn’t susceptible to it — and Google has said that this has been fixed the latest Android security patches for previous Android versions. When I asked out in-house security guru Jerry Hildenbrand about how worried the average user would need to be about it, he summed it up pretty easily:

It seems sophisticated, so its not very likely to have ever been found or used “in the wild”. It was also patched in last security update, so even Google sees how important it was to close the hole even considering the above.

So, what happened here is the system seeming to work: some security researchers found an exploit, told Google and collected their bug bounty for it, Google patched the bug, and then the security researchers published what they found after most phones were protected by the new patch so that they could show off their work and remind us why security researchers matter.

Thanks, Promon, and nice logo.

  • Android Security Bulletin: Everything you need to know!

Latest posts

You can already save up to $50 on the new M4 iPad Air

In case you missed it, Apple announced a host of new devices this week, including both a new phone and a cheaper laptop. It...

The AI Doc is an overwrought hype piece for doomers and accelerationists alike

Co-director Daniel Roher. | Image: Focus Features We are in the thick of a massive push to incorporate generative AI into almost every aspect of...

Nintendo is suing the US government for a refund of Trump’s illegal tariffs

Nintendo of America is suing the US government over President Trump's tariffs and is demanding a "prompt refund, with interest" of any duties that...

Pokémon Pokopia review: Possibly the most charming Pokémon game yet

One of the biggest issues with mainline Pokémon games is that you're often so focused on catching, battling and trying to be the very...

Samsung Galaxy Buds 4 and 4 Pro review: Impressive audio, imperfect ANC

Samsung caught flak for the Galaxy Buds 3. The company’s mimicry of Apple’s AirPods was all too obvious last year when it opted for...

Nintendo is suing the US government over Trump’s tariffs

Nintendo of America is suing the US government, including the Department of Treasury, Department of Homeland Security and US Customs and Border Protection, over...