{"id":20709,"date":"2020-06-04T17:45:02","date_gmt":"2020-06-04T21:45:02","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=20709"},"modified":"2022-04-27T14:51:07","modified_gmt":"2022-04-27T18:51:07","slug":"strandhogg","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/strandhogg\/","title":{"rendered":"StrandHogg 2.0 Steals Data From Real Apps"},"content":{"rendered":"<p>Named after the Norse term for an ancient Viking technique for coastal raids, StrandHogg 2.0 is a nefarious new update to an earlier trojan-like malware. Its particular way of working undercover and seizing user data is notable. The relentless inventiveness of hackers is very much on display with this latest threat.<\/p>\n<h3><b>Strandhogg 2.0: Worse Than The Original<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u201cStrandHogg 1.0\u201d used Android\u2019s task affinity to hijack applications\u2014by matching the packageName of any other app, then allowing \u201cTaskReparenting,\u201d the StrandHogg app would be launched, undercover, in place of the target app \u2014 then share the information with the attacker and the targeted app (to go unnoticed).<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/06\/faa5dbff4441d817f0bf05fc28b69773.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20712\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/06\/faa5dbff4441d817f0bf05fc28b69773.png\" alt=\"\" width=\"800\" height=\"337\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/06\/faa5dbff4441d817f0bf05fc28b69773.png 800w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/06\/faa5dbff4441d817f0bf05fc28b69773-300x126.png 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/06\/faa5dbff4441d817f0bf05fc28b69773-768x324.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p><i><span style=\"font-weight: 400;\">Image Source: Promon<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Emilio Simoni, research director at<strong> <a href=\"https:\/\/www.psafe.com\/dfndr-lab\/\/?utm_source=blog&amp;utm_content=stranhogg\">dfndr lab<\/a><\/strong> explains:\u00a0 \u201cUsing this method, you would see (for one typical example) what looks like a fully legitimate Gmail icon on your phone, with the usual login dialogue \u2014 just exactly as it would appear when you\u2019re logging back\u00a0 into your account. <strong>But once you enter your credentials, you\u2019ve unknowingly shared them with the attacker too<\/strong>. To shield its intervention, your info is <\/span><i><span style=\"font-weight: 400;\">also<\/span><\/i><span style=\"font-weight: 400;\"> sent to Gmail (or whatever other legitimate application has been hijacked), continuing your transaction and leaving no signs you\u2019ve been compromised. The malware comes on board in the form of innocent looking game apps \u2014 one named SuperHappyFunGame \u2014 but it does its worst work undercover.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">StrandHogg&#8217;s 1.0 weakness was the presence of sketchy task affinity codes in the Android Manifest. Scouring for the 1.0 version required simply scanning the Google Play store for these problematic taskAffinity declarations. But StrandHogg 2.0 doesn&#8217;t require any special settings, because the attacking code isn\u2019t necessarily present on the Play Store. Instead, the attacker just downloads the attack code later, once the trojan app or game has taken up residence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">StrandHogg 2.0 <strong>also hijacks additional data via app permissions<\/strong>: so contacts, photos, and it can even victim\u2019s movements and location are compromised. Simoni advises: \u201cWith the right permissions, StrandHogg 2.0 can even siphon off entire text message conversations, which can enable hackers to defeat two-factor authentication protections.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Norwegian security firm Promon, the firm that gave the malware its name,\u00a0 suggests that updating Android devices with the latest security updates \u2014 out now \u2014 will fix the vulnerability. Users are advised to update their Android devices as soon as possible.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cHowever,\u201d Simoni warns, \u201cthe key is protecting yourself from the next StrandHogg.\u00a0 <strong>For that, you need a front line of defense<\/strong>.\u201d\u00a0<\/span><\/p>\n<h3><b>Protecting Your Devices and Data From Unsafe Apps<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">You should always count on a extra layer of security for your phone. <strong><a href=\"https:\/\/go.onelink.me\/U4Bc?pid=MKT_BLOG_US&amp;amp;c=strandhogg\">dfndr security<\/a><\/strong>, for example, has a <strong>Safe App Installer<\/strong> feature that can operate as your advance-line of defense against apps like SuperHappyFunGame, and the <\/span><i><span style=\"font-weight: 400;\">next<\/span><\/i><span style=\"font-weight: 400;\"> generation of trojans\u00a0 StrandHogg uses. Safe App Installer will also keep you protected from all other malicious apps. \u201cThe feature lets you know if an app is unsafe <\/span><strong><i>before<\/i><\/strong><span style=\"font-weight: 400;\"> you even install it,\u201d Simoni advises, \u201cand our team does the work to constantly update our database of malicious apps.\u201d With Safe App Installer, <\/span><i><span style=\"font-weight: 400;\">every<\/span><\/i><span style=\"font-weight: 400;\"> app you consult before installation will be rated for trust.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are two levels of alert if Safe App Installer discovers an issue:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong>Security Alert:<\/strong> If the app is malware.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong>Privacy Alert:<\/strong> If the app already experienced a data breach<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">An app is rated as Trusted only if the app is not malware or has never experienced a data breach.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong><a href=\"https:\/\/go.onelink.me\/U4Bc?pid=MKT_BLOG_US&amp;amp;c=strandhogg\">dfndr security<\/a><\/strong> also offers Anti-Theft Protection for your device, and Identity theft protection for you.\u00a0 \u201cOur PRO package has been very thoroughly thought out to provide users with the full suite of protections they need,\u201d Simoni concludes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ll continue to provide updates here on the PSafe blog for new malware that could compromise your security and safety \u2014 stay tuned!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Named after the Norse term for an ancient Viking technique for coastal raids, StrandHogg 2.0 is a nefarious new update to an earlier trojan-like malware.<\/p>\n","protected":false},"author":83,"featured_media":20713,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[30,182,4460,12438],"class_list":["post-20709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-android","tag-malware","tag-news","tag-strandhogg"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=20709"}],"version-history":[{"count":2,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20709\/revisions"}],"predecessor-version":[{"id":20715,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20709\/revisions\/20715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/20713"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=20709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=20709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=20709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}