Android StrandHogg vulnerability demo | Exploit | PoC | Malware

Поділитися
Вставка
  • Опубліковано 8 вер 2024
  • Android StrandHogg vulnerability
    Vulnerability allows malicious app to masquerade as any other app on the device.
    If you launch Facebook, malware is executed.
    In the video is simple exploitation of the vulnerability.
    More info: promon.co/secu...
    SUBSCRIBE: / lukasstefankoinfosec
    FOLLOW: / lukasstefanko

КОМЕНТАРІ • 27

  • @mobilehacker
    @mobilehacker  4 роки тому +2

    [Update]
    StrandHogg was used by Android banking Trojan (BankBot) found on Google Play in 2017
    Using "taskAffinity" it impersonated Google Play Store app to request credit card details from the victim.
    I created a PoC video to demonstrate StrandHogg in this 2 years old malware: twitter.com/ESETresearch/status/1202154415584694272
    More info: www.welivesecurity.com/2017/09/25/banking-trojan-returns-google-play/

  • @codenamepk
    @codenamepk 3 роки тому +1

    Which application is using in your phone to show the methods

  •  4 роки тому

    Hello Lukas. I can't clean up fake Flash Player apps from my phone ( Samsung Note 5 ) That fake Player don't let me clean itself. PLEASE help me how can I do it ??

  • @user4gent416
    @user4gent416 4 роки тому +1

    Download link for PoC please. I want to try it on my phone.

  • @atalyy
    @atalyy 4 роки тому +1

    Hello Lukas :) I have a quick question, will my mcafee mobile antivirus stop all or majority of viruses from play store? Thanks in advance.

    • @mobilehacker
      @mobilehacker  4 роки тому +2

      Hey Monika, it depends because antivirus simply cant detect this single thing as issue however, if it is used in malicious app then your mobile antivirus should protect you. So, the quick answer is yes, your antivirus can protect you if it is used in app with malicious functionality.

    • @atalyy
      @atalyy 4 роки тому +1

      @@mobilehacker Thank you

  • @truelies5431
    @truelies5431 4 роки тому

    My old phone has it, it was disguised as Ccleaner, the phone had a lot of ads popping everywhere which made me install Ccleaner didn't help much so I decided to uninstall chrome (since ads were displaying as notifications from chrome) still didn't work ... Then decided to reinstall all apps.. Ads stopped popping but somehow the fake Ccleaner app keeps coming back ( it's called fireplo version 1.0) tried denying permissions..deleting "APPMARKET" folder which had pictures of ads in it...it just keeps coming back..how?

    • @nmsepic8798
      @nmsepic8798 4 роки тому +1

      Because your phone infected with adware malware if you are using old Android version then just reset your phone clear phone cache as well
      Also try to update your Android version

    • @truelies5431
      @truelies5431 4 роки тому +1

      @@nmsepic8798 Thanks buddy, I did that...I also realized there was a fake program on old family PC that pushed android malware whenever ADB was available

  • @shaiksohel9821
    @shaiksohel9821 3 роки тому

    Call data app hack how to plz bro

  • @kimberlyanaya7963
    @kimberlyanaya7963 4 роки тому

    dónde se descarga?

  • @lucamaina5001
    @lucamaina5001 4 роки тому

    Do you know if and when the patch will be published?

    • @mobilehacker
      @mobilehacker  4 роки тому +1

      I dont think there will be any, since Google doesn't recognize it as bug. This is a legit Android functionality but, it can be misused for phishing by malware.

    • @goodluck6948
      @goodluck6948 4 роки тому

      @@mobilehacker that's really stupid, insanely easy phishing

  • @arthursumer6012
    @arthursumer6012 4 роки тому

    I also successfully tested this code and I will record an attack video

  • @oryonsf
    @oryonsf 4 роки тому +4

    where is exploit ?

    • @mobilehacker
      @mobilehacker  4 роки тому +11

      Exploit is on my local disk. I will not publish PoC code, since the issue is not fixed.

    • @yuval6508
      @yuval6508 4 роки тому +1

      Skiddie...

    • @MrDamuni
      @MrDamuni 4 роки тому +3

      Yuval 🖕🏼

    • @blurryface7840
      @blurryface7840 4 роки тому

      I have the exploit!
      DM : bboyben234@gmail.com

    • @MrDamuni
      @MrDamuni 4 роки тому

      Marsh Arcan it's better by telegram or protonmail bro.

  • @MikeHansondev
    @MikeHansondev 4 роки тому

    Couldn't you just put the Facebook icon and name over the clean activity in this demo? lol

    • @mobilehacker
      @mobilehacker  4 роки тому +2

      That would do the trick however, that is why after testing the first PoC I actually launched Facebook to demonstrate that it is the real one. :).

  • @xdevman
    @xdevman 4 роки тому

    :)