May 31, 2017 By Mark Samuels 2 min read

Your Android device could be at risk from a new class of attack that allows for full takeover of the smartphone. Researchers at Georgia Tech recently discovered an attack known as Cloak and Dagger. It gives cyberattackers the opportunity to undertake malicious control of an Android device without users noticing the errant activity.

Overall, malicious malware is becoming a frequent issue in the app marketplace. Researchers recently uncovered several Android apps that masqueraded as a Funny Videos app on the Google Play Store but distributed a banking Trojan.

How Is Your Device Affected?

The Cloak and Dagger attack abuses a pair of legitimate app permissions that are used across certain features on Androids. These permissions are known as SYSTEM_ALERT_WINDOW (“draw on top”) and BIND_ACCESSIBILITY_SERVICE (“a11y”). The first permission allows apps to overlap on a device’s screen, and the second lets disabled users enter inputs via voice commands.

Abuse of these permissions makes it easier for cybercriminals to potentially develop and then submit a malicious app to Google Play Store. Mashable reported that an actor could use these accepted permissions paired with a “God-Mode” app to access messages and calls, keylog and clickjack a smartphone.

In this specific attack case, the user does not necessarily need to grant permission and is not even notified of a change in device behavior. In fact, the researchers performed a 20-person user study, and no one could detect malicious activity.

How Is the Issue Being Resolved?

These attacks affect all recent versions of Android, including 7.1.2, and researchers suggested that the flaws are not yet fixed. They also said the problem could be difficult to resolve because the issues involve two standard features in Android OS.

A Google spokesperson told The Register that the technology giant has been in close contact with the researchers in Georgia. The spokesperson added the company refreshed Google Play Protect to prevent the installation of malware and detect any similar malicious apps in the future.

Google said it already built new security protections into Android O that will strengthen protection in the future. However, Google O is scheduled for release later this year, and users will need to wait for higher levels of protection.

How Should Users React?

Georgia Tech said users should check which applications have access to the draw on top and the a11y permissions. They can also disable the draw on top permission used in Android 7.1.2.

The Hacker News explained the most comprehensive way to avoid hacking is to download apps from trusted and verified developers in the Google Play Store. The article also advised users to check for app permissions before installation.

News of this attack comes in the wake of a continuing run of stories involving mobile malware and banking Trojans. Users should stay alert to potential security risks and ensure app permissions are both monitored and restricted. If an app seems to ask for more permissions than necessary, avoid it all together.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today