May 31, 2017 By Mark Samuels 2 min read

Your Android device could be at risk from a new class of attack that allows for full takeover of the smartphone. Researchers at Georgia Tech recently discovered an attack known as Cloak and Dagger. It gives cyberattackers the opportunity to undertake malicious control of an Android device without users noticing the errant activity.

Overall, malicious malware is becoming a frequent issue in the app marketplace. Researchers recently uncovered several Android apps that masqueraded as a Funny Videos app on the Google Play Store but distributed a banking Trojan.

How Is Your Device Affected?

The Cloak and Dagger attack abuses a pair of legitimate app permissions that are used across certain features on Androids. These permissions are known as SYSTEM_ALERT_WINDOW (“draw on top”) and BIND_ACCESSIBILITY_SERVICE (“a11y”). The first permission allows apps to overlap on a device’s screen, and the second lets disabled users enter inputs via voice commands.

Abuse of these permissions makes it easier for cybercriminals to potentially develop and then submit a malicious app to Google Play Store. Mashable reported that an actor could use these accepted permissions paired with a “God-Mode” app to access messages and calls, keylog and clickjack a smartphone.

In this specific attack case, the user does not necessarily need to grant permission and is not even notified of a change in device behavior. In fact, the researchers performed a 20-person user study, and no one could detect malicious activity.

How Is the Issue Being Resolved?

These attacks affect all recent versions of Android, including 7.1.2, and researchers suggested that the flaws are not yet fixed. They also said the problem could be difficult to resolve because the issues involve two standard features in Android OS.

A Google spokesperson told The Register that the technology giant has been in close contact with the researchers in Georgia. The spokesperson added the company refreshed Google Play Protect to prevent the installation of malware and detect any similar malicious apps in the future.

Google said it already built new security protections into Android O that will strengthen protection in the future. However, Google O is scheduled for release later this year, and users will need to wait for higher levels of protection.

How Should Users React?

Georgia Tech said users should check which applications have access to the draw on top and the a11y permissions. They can also disable the draw on top permission used in Android 7.1.2.

The Hacker News explained the most comprehensive way to avoid hacking is to download apps from trusted and verified developers in the Google Play Store. The article also advised users to check for app permissions before installation.

News of this attack comes in the wake of a continuing run of stories involving mobile malware and banking Trojans. Users should stay alert to potential security risks and ensure app permissions are both monitored and restricted. If an app seems to ask for more permissions than necessary, avoid it all together.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today