WWW.FOXNEWS.COM
New Android attack tricks you into giving dangerous permissions
A team of academic researchers has uncovered a new Android security exploit that raises a lot of questions about the platforms permission system. The technique, named TapTrap, uses user interface animations to visually deceive you into granting sensitive permissions or performing harmful actions. Unlike earlier tapjacking attacks, TapTrap Android attack works by launching transparent system prompts over regular app interfaces. The result is a near-invisible layer that silently captures your taps and interactions.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, youll get instant access to my Ultimate Scam Survival Guide - free when you join myCYBERGUY.COM/NEWSLETTERNEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUDAs reported by Bleeping Computer, TapTrap takes advantage of how Android handles activity transitions between apps. A malicious app can launch a system-level screen using the standard start Activity function but modify how the screen appears using a custom animation. By setting both the start and end opacity to a very low value, such as 0.01, the activity becomes nearly invisible to the user.Touch input is still fully registered by the transparent screen, even though users only see the visible app underneath. Attackers can also apply a scaling animation that enlarges a specific user interface element, such as a permission button, so that it fills the screen. This increases the chance that a user will unknowingly tap the button.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The researchers released a video showing how this technique could be used in a gaming app to quietly launch a Chrome browser permission prompt. The prompt asks for camera access, and the user taps "Allow" without realizing what they have done. Because the malicious screen is transparent, there are no visual cues to suggest anything suspicious is happening.To assess how widespread the vulnerability might be, the researchers tested nearly 100,000 apps from the Play Store. About 76% were found to be potentially vulnerable, not because they are malicious, but because they lack key safeguards. These apps had at least one screen that could be launched by another app, shared the same task stack, failed to override the default transition animation, and did not block user input during the transition.Android enables these animations by default. Users can only disable them through settings that are typically hidden, such as Developer Options or Accessibility menus. Even the latest Android version, tested on a Google Pixel 8a, remains unprotected against this exploit.GrapheneOS, a security-focused operating system based on Android, confirmed that its current version is also affected. However, it plans to release a fix in its next update.GET FOX BUSINESS ON THE GO BY CLICKING HEREGoogle has acknowledged the issue and said a future Android update will contain a mitigation. While no exact timeline has been announced, Google is expected to change how input and animations are handled to prevent invisible tap interception.The company added that developers must follow strict Play Store policies and that any app found abusing this vulnerability will face enforcement actions.1) Consider a mobile security app:Use a trusted antivirus or mobile security app that can detect suspicious behavior or alert you to apps using overlays or accessibility features improperly.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices atCyberGuy.com/LockUpYourTech2) Be selective about the apps you install:Avoid installing apps just because theyre trending or have flashy ads. Check developer credibility, recent reviews and app permissions before downloading.3) Stick to the Google Play Store:While not perfect, the Play Store has better safeguards than random APK sources. Avoid installing apps from third-party stores or unknown websites.4) Pause before granting permissions:If an app suddenly asks for access to your camera, microphone, or other sensitive features, take a moment. Always ask yourself if this app really needs this permission right now.TapTrap shows that security threats do not always come from complex code or aggressive malware. Sometimes, small oversights in visual behavior can open paths for serious abuse. In this case, the danger lies in what users do not see. People trust what they can see on their screens. This attack breaks that link by creating a visual mismatch between intent and outcome.Do you trust the apps you install from the Play Store, or do you dig deeper before downloading? Let us know by writing us atCyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, youll get instant access to my Ultimate Scam Survival Guide - free when you join myCYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com. All rights reserved.
0 Kommentare 0 Geteilt 7 Ansichten 0 Bewertungen
Download The App AtoZ Buzz! Take Control of the narrative https://atozbuzz.com