Security Loopholes in Android

Security Loopholes in Android – Your bank login information can be hacked easily

Android Security Issues 2019

As, it is well known that this is an era of cybercrimes, People these days are involved in theft but not by robbing into streets or houses but by using technology and stealing sensitive data from people and use them for different purposes. A recent discovery is made about spoofing bug which is specifically designed for stealing bank credentials of Android phone users. This is one of the major loopholes discovered in Android so far, a hacker can easily steal bank login information and then you can rest in peace.

There are some legitimate applications that are designed for this purpose, the will display a fake login screen, by entering login details into it you provide your sensitive information to hackers. As reported by a recent survey of Google Play store applications, more than 56 financial organizations are the victim of this theft and this tech Giant is doing everything possible to track this loophole and its origin. As stated by C.E.O of Promon (which is a mobile security firm)

“This bug targeted several banks in multiple countries and it also successfully exploited so many end-users to steal money as well.”

Emptying Bank Accounts

This loophole of security was discovered in Android when a lot of bank accounts were drained by mobile applications. This vulnerability is labeled as StrandHogg which makes its users feel like they are using the legitimate app but actually they are in a trap. StrandHogg vulnerability provides a screen just like the actual app and trick users when they click or enter their sensitive information.

It is very difficult to track and monitor this whole process and login attempts and interactions can be lost in this complexity. Promon is working in collaboration with security firms in the US to identify apps that have enabled StrandHogg in the Android Play store. Promon has identified 60 financial organizations that are being targeted through such applications and these apps were having loopholes for Google’s Android software.

It is stated by Lookout that hackers have designed applications similar to some well-known vulnerable money stealing app called “bank bot”.  The research work by Google is highly appreciated as they have identified malicious apps and let the world know what’s going on with online banking. This response is welcomed by Promon and according to their report there were so many apps that were having spoofing bug and there is a possibility that fake user screens can be created in the latest Apps in Android 10 and earlier versions.

Summarizing this, Lookout and Promon have joined hands to figure out this loophole and they are offering their services to Android developers about protecting their app’s integrity, impeding hacker’s attempts to reverse-engineering codecs,  avoid hooking at run time and detecting different kind of fake User interface and overlay screen. Lookout app defense is capable of identifying various kinds of malware, viruses, Trojan and has excellent predictive behavior.

Bottom Line

  • It is highly recommended to update Android security services monthly or have the latest update.
  • Also, before installing and financial app make sure to check its license and other requirements.
  • Try to use some protection software just like Lookout which has app defense and protects your information from hacking.

FAQs

How do I secure my Android phone?

It is highly recommended to update Android security services monthly or have the latest update.
Also, before installing and financial app make sure to check its license and other requirements.
Try to use some protection software just like Lookout which has app defense and protects your information from hacking.

What is secure service android?

Lookout app defense is capable of identifying various kinds of malware, viruses, Trojan and has excellent predictive behavior.

Share it with your friends @

Leave a Reply

Your email address will not be published. Required fields are marked *