Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Overlays For Androids For Criminal Convenience
Facebook   X   LinkedIn   Email

Overlays For Androids For Criminal Convenience

January 25, 2025

Android Overlays are a powerful feature in the Android operating system. Theses allow apps to display content over other apps or over the system user interfaces. Ultimately this results in the user experience being more, well, user-friendly. So why is it important? This is useful in many ways, such as for displaying persistent notifications, those cheeky Android chat heads that float around the screen, or for using accessibility features. You know what’s coming next. Those handy capabilities can also be misused by cybercriminals to create deceptive interfaces and put them in apps to trick users into performing unintended actions, such as entering sensitive information.

One out right now that is catching a lot of people is placing a full window overlay over another app's legitimate screen. This allows an attacker to capture every input into the device. So, if it’s a financial institution’s app, they’ll get the login credentials, for example. Perhaps a more nefarious use is to capture social media login credentials. You might think this is harmless, but many people use their social media usernames and passwords to log in to other accounts, making that combination quite useful.

It’s Secure, right?

The primary security concern with overlays is their potential to be used for phishing attacks. For instance, a malicious app can display an overlay that looks identical to a legitimate app's login screen, tricking the user into entering their credentials. This technique is more commonly known as “clickjacking, but is often referred to as "tapjacking" on Android apps. While you think you’re entering your information into your financial institution’s app, for instance, the overlay allows the criminals to capture that info instead of it going into your app.

Preventing Misuse

Android has security features to help with respect to overlays. You can check your Android device by going to Settings >Apps > Options > Special access > Appear on top. This may be a little different depending on what version of the operating system you’re using. In any case, disable any special access feature that you don’t recognize or that don’t require the use of overlays. It might surprise you that some actually do. If you aren’t sure, disable it and find out if the app works without it. If not, go turn it back on.

Definitely use multi-factor authentication whenever available; and install an anti-malware service on all of your devices. And if you didn’t guess already, don’t use the same login and password combination for multiple accounts, especially social media or others that have a lot of information about you connected to them (think Apple or Google credentials).


Chameleon Malware Changes Its Colors Again

Mobile Security

Chameleon Malware Changes Its Colors Again

Android malware is constantly advancing and acquiring new frightening capabilities. Chameleon is the name of a trojan that was designed to infiltrate Android Operating Systems. This program can obtain data, with a particular focus on financial information, and carry out numerous other malicious activities; none that are in your favor. Even more worrying is that the Chameleon Android malware received an upgrade making it new and improved from that of its former self. READ FULL STORY

When What You See Is Not What You Get

Corporate Security

When What You See Is Not What You Get

Although it may sound strange, bad actors are exploiting what we see – or what we think we see. Always looking for new ways to gain our confidence, cybercriminals are counting on us being human to make this con work. Trust, fear, and concern are some of the emotions being exploited, which is nothing new for hackers. But what is new is taking advantage of our assumption that when we see a trusted website, it’s worthy of our trust…Well, maybe not so much anymore. READ FULL STORY

BOLO Android Banking Apps — New Malware Evades Detection

Mobile Security

BOLO Android Banking Apps — New Malware Evades Detection

A new malware targeting Android banking apps is making its way around the globe, and the U.S. may be in its path. Called FjordPhantom, this tricky malware is infecting banking apps with help from sophisticated tricks for flying under the radar. This banking trojan's clever mix of phishing emails combined with social engineering TOAD attacks helps this malware get what it's after...your banking credentials and your money. Don’t know what a TOAD attack is. Well, in short, it’s not the amphibious kind. We’ll get to it shortly. READ FULL STORY

Fake Browser Updates Source Of Ransomware And Banking Malware

Scams & Phishing

Fake Browser Updates Source Of Ransomware And Banking Malware

An all-out alarm reported by Surcuri finds bogus alerts circulating about the need to download the latest browser update. Although it’s always recommended to keep software up to date, this report finds hackers are exploiting that call to action in a big way. Using fake updates isn’t exactly a new hacking exploit, but hackers are getting better at it over time and this latest attack is a solid example of that. In this latest discovery, hackers use email links or script code to compromise a webpage. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...