Name Activity Hijack
Summary An adversary intercepts an implicit intent sent to launch a trusted activity and instead launches a counterfeit activity in its place. The malicious activity is then used to mimic the trusted activity's user interface and prompt the target to enter sensitive data as if they were interacting with the trusted activity.
Prerequisites The adversary must have previously installed the malicious application that will run in place of the trusted activity.
Solutions To mitigate this type of an attack, explicit intents should be used whenever sensitive data is being sent. An 'explicit intent' is delivered to a specific application as declared within the intent, whereas an 'implicit intent' is directed to an application as defined by the Android operating system. If an implicit intent must be used, then it should be assumed that the intent will be received by an unknown application and any response should be treated accordingly (i.e., with appropriate security controls). Never use implicit intents for inter-application communication.
Related Weaknesses
CWE ID Description
CWE-923 Improper Restriction of Communication Channel to Intended Endpoints
Back to Top