StrandHogg 2.0: Explained

  Рет қаралды 1,978

Wultra

Wultra

Күн бұрын

A critical Android OS vulnerability is back. StrandHogg 2.0 poses a threat to end users by allowing attackers to perform overlay attacks or request additional permissions while being perfectly hidden in the background. Join us to explore Strandhogg 2.0 and see how to mitigate this critical Android vulnerability.
Chapters:
0:00 Welcome to the webinar
2:07 Introduction
3:16 History of StrandHogg
5:54 Demo of the attack
10:19 Android tasks and activities
12:22 Tasks and activities in StrandHogg 2.0
14:47 Affected Android versions
17:30 Mitigation techniques
21:01 Concluding the webinar
Visit wultra.com for more details.

Пікірлер: 3
@sentinel8758
@sentinel8758 3 жыл бұрын
I still don't understand how someone is targeted by this. Does this require you to download something from the play store that is actually a fake app disguised as a normal one, or are they required to know the target's individual phone system information?
@dvorakpetr
@dvorakpetr 3 жыл бұрын
You download a malware masked as "New Hello Kitty Adventure" game from Google Play (or elsewehere) and play it for a while, launch your regular "Bank of America" app, and you are presented with fake phishing screen. That's basically it... Attacker does not neet to know anything about your device beforehand, they can prepare the attack after you download the malware and launch it.
@sentinel8758
@sentinel8758 3 жыл бұрын
@@dvorakpetr Thank you, that clears things up very well!
Digital Banking and Post-Quantum Cryptography
13:13
Wultra
Рет қаралды 385
Survival skills: A great idea with duct tape #survival #lifehacks #camping
00:27
3M❤️ #thankyou #shorts
00:16
ウエスP -Mr Uekusa- Wes-P
Рет қаралды 14 МЛН
How Prometheus Monitoring works | Prometheus Architecture explained
21:31
TechWorld with Nana
Рет қаралды 1 МЛН
StrandHogg- The New Android Vulnerability
2:27
Securemetric
Рет қаралды 12 М.
5 Myths about Watercooling that are WRONG!
24:02
JayzTwoCents
Рет қаралды 174 М.
An Illustrated Guide to OAuth and OpenID Connect
16:36
OktaDev
Рет қаралды 563 М.
How does HTTPS work? What's a CA? What's a self-signed Certificate?
11:02
Nessus Vulnerability Scanner Tutorial (Cyber Security Tools)
13:06
Cybersecurity Assets, Network Threats & Vulnerabilities | Google Cybersecurity Certificate
2:06:36
Зря они облили полицейскую водой...😂
0:25
БАЧОК ПОТИК
0:22
KINO KAIF
Рет қаралды 2,6 МЛН
Такого они не видели😱😍
0:55
Следы времени
Рет қаралды 3,7 МЛН
Найди Влада на стадионе
0:26
ЛогикЛаб
Рет қаралды 4,1 МЛН