This is a very big hypothetical.
They’d need to already have access to your account credentials (email, password or at least something that is regarded the same) then have you install this malicious app, then you’d need this app to be open at the same time as your 2FA app
It’s possible, yes, it’s an awesome find, yes, and this should be patches, yes yes yes, a thousand yes
Having said that, I’m not too worried about the potential impact of this, it’ll be fine.
tidderuuf@lemmy.world 1 day ago
Let me stop you right there… and leave.
NaibofTabr@infosec.pub 1 day ago
Normally I would agree with this perspective, but in this case the “malicious app” is just a demo. It requires no permissions to do the malicious behavior, which means that the relevant code could be included in any app and wouldn’t trigger a user approval, a permissions request or a security alert. This could be hiding in anything that you install.
krooklochurm@lemmy.ca 23 hours ago
Man in the middle an app download or find some kind of exploit to inject the code from a website, ta da.
I mean, obviously there’s more to it than this but.
NihilsineNefas@slrpnk.net 1 day ago
So they’re using the same programs that the three letter agencies of the world have been using to crack phones since before touchscreens existed?
FreedomAdvocate@lemmy.net.au 1 day ago
So it could be hiding in, what would you call them…….malicious apps?
The relevant code isn’t going to be in a non malicious app.