google.com, pub-8701563775261122, DIRECT, f08c47fec0942fa0
USA

New Android attack tricks you into giving dangerous permissions

A team of academic researchers has revealed a new Android security abuse, which has created many questions about the platform’s permission system. The so -called fresh technique uses user interface animations to visually deceive you to give you sensitive permissions or perform harmful actions. Unlike previous tap shoots, the Taptrap Android attack works by initiating transparent system requests via normal application interfaces. The result is a visible layer that quietly captures your taps and interactions.

Sign up for my free Cyberguy report
Get my best technology tips, emergency security warnings and special opportunities delivered directly to your incoming box. Also, you will instantly access my final fraud survival guide – Cyberguy.com/newsletter

The new Google AI makes robots smart without clouds

As reported by Blewing Computer, the Taptrap uses how Android deals with the transitions of activity between applications. A malicious application can start a system at the system level using the standard starting activity function, but it can change how the screen looks using a special animation. By setting both starting and final opaque to a very low value of 0.01, the event becomes almost invisible for the user.

Although the Touch input is still fully saved by the transparent screen, although users see the visible application only below. The attackers can also apply a scaling animation that expands a specific user interface element, such as the permit button. This increases the chances of a user to touch the button without knowing.

What is Artificial Intelligence (AI)?

Researchers have released a video showing how this technique can be used in a game application to start a Chrome browser permission request quietly. Request the camera access and the user “allows” without noticing what they do. Since the malicious screen is transparent, there are no visual clues that show that something is suspicious.

In order to assess how common the vulnerability of the vulnerability, the researchers tested approximately 100,000 applications from the game store. Approximately 76% of them were potentially vulnerable because they were lacking basic assurances, not because they were malicious. In these applications, there was at least one screen that could be initiated by another application, shared the same stack of tasks, invalidated the assumed transition animation and did not block the user entry during the transition.

Android activates these animations by default. Users can typically disable them through hidden settings, such as developer options or accessibility menus. Even the latest Android version tested in a Google Pixel 8A remains unprotected against this abuse.

Grapheneos, a security -oriented operating system based on Android, confirmed that the current version was also affected. However, it plans to publish a correction in its next update.

Click here and get Fox Business on movement

Google accepted the problem and said that a future Android update would contain a mitigation. Although the exact timeline has not been disclosed, Google is expected to change how the entrances and animations are processed to prevent invisible faucet intervention.

The company added that developers should follow the solid game store policies and that any application that abuse this vulnerability will face application actions.

1) Think of a mobile security application: Use a reliable antivirus or mobile security application that can detect suspicious behavior or warn applications using coatings or accessibility properties.

Get my choices for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices Cyberguy.com/Lockupech

2) Be selective about the applications you have installed: Avoid uploading applications because they are just trend or showy ads. Before downloading the developer reliability, latest reviews and application permits.

3) Stay loyal to Google Play Store: Although not perfect, the Play Store has better assurances than random APK sources. Avoid installing applications from third -party stores or unknown websites.

4) Pursuing before allowing: If an application suddenly requested access your camera, microphone or other sensitive features, take a minute. Ask yourself if this application really needs this permission right now.

Taptrap shows that safety threats do not always come from complex code or aggressive malware. Sometimes, small supervisions in visual behavior can open ways for serious abuse. In this case, the danger is what users do not see. People trust what they can see on their screens. This attack breaks this connection by creating a visual mismatch between intention and conclusion.

Do you rely on the applications you have installed from the Play Store, or do you go deeper before downloading? Type us by writing to us Cyberguy.com/contact

Sign up for my free Cyberguy report
Get my best technology tips, emergency security warnings and special opportunities delivered directly to your incoming box. Also, you will instantly access my final fraud survival guide – Cyberguy.com/newsletter

Copyright 2025 Cyberguy.com. All rights reserved.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button