Account Takeover exploiting vulnerability in Android's Play Core Library Code - Demo

Subscribers:
79,800
Published on ● Video Link: https://www.youtube.com/watch?v=Dfa8JEvnteY



Duration: 3:16
9,745 views
61


Countless apps on Google’s Play Store are still vulnerable to a known bug, CVE-2020-8913, that allows threat actors to inject malicious code into vulnerable applications, in order to gain access to all the same resources of the hosting application.
Threat actors can use the vulnerable apps to siphon off sensitive data from other apps on the same device, stealing users’ private information, such as login details, passwords, financial details, and mail.

Read the full research at research.checkpoint.com
Check Point Research on Facebook: facebook.com/CheckpointResearch
Check Point Research on Twitter: twitter.com/_CPResearch_
Check Point Research Podcast channel: research.checkpoint.com/category/cpradio/




Other Videos By Check Point Software


2021-01-25Do More on Microsoft Azure with Check Point CloudGuard
2021-01-19Protección contra el nuevo ransomware relacionado con Cyberpunk 2077
2021-01-15NRF 2021 Retail’s Big Show: Your eCommerce Platform is High Fashion, What About the Security?
2021-01-15Protecting Against the New Cyberpunk 2077-Related Ransomware
2021-01-13Lateral Movement Under the Radar – Attack & Investigation Series
2021-01-08Check Point Partners: Learn about Demos, Tools, and Resources
2021-01-06CloudGuard CSPM Network Training Video
2020-12-312020 Check Point
2020-12-15Strategies for Protecting IoT Devices and Networks from Cyber Attacks with Russ Schafer
2020-12-14Introduction to CloudGuard on Oracle Cloud Infrastructure: Peace of Mind as You Migrate to the Cloud
2020-12-04Account Takeover exploiting vulnerability in Android's Play Core Library Code - Demo
2020-12-02Siemplify SOAR + Check Point Integration – Playbook and Demo
2020-12-0140% of the World's Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk?
2020-12-01A Glimpse Into The Future of Cyber Security
2020-11-24IDC Presents: Cloud Security, COVID-19, the New Normal and the Next Normal
2020-11-23Part #8: 5 Must-Have Protections for Office 365 and G Suite
2020-11-23Part #6: 5 Principles for Choosing the Right Mobile Security Solution
2020-11-23Part #5: The New and Dangerous Wave of Mobile Threats
2020-11-23Part #4: 5 Principles for Choosing the Right Endpoint Security
2020-11-23Part #3: 5 Must-Have Endpoint Protections
2020-11-23Part #2: 3 Key Principles for Securing the Remote Workforce