Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

Avatar
Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress. Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority. Users who attempt

Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress.

Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority.

Users who attempt to do so during phone calls are served the message: “Scammers often request this type of action during phone call conversations, so it’s blocked to protect you,” If you are being guided to take this action by someone you don’t know, it might be a scam.”

Furthermore, it blocks users from giving an app access to accessibility over the course of a phone call.

The feature is currently live in Android 16 Beta 2, which was released earlier this week. With this latest addition, the idea is to introduce more friction to a tactic that has been commonly abused by malicious actors to deliver malware.

Dubbed telephone-oriented attack delivery (TOAD), these approaches involve sending SMS messages to prospective targets and instructing them to call a number by inducing a false sense of urgency.

Last year, NCC Group and Finland’s National Cyber Security Centre (NCSC-FI) disclosed that cybercriminals were distributing dropper apps using a combination of SMS messages and phone calls to trick them into installing malware such as Vultr.

The development comes after Google expanded restricted settings to cover more permission categories in order to prevent sideloaded apps from accessing sensitive data.

It has also rolled out the ability to automatically block sideloading of potentially unsafe apps in markets like Brazil, Hong Kong, India, Kenya, Nigeria, Philippines, Singapore, South Africa, Thailand, and Vietnam to tackle fraud.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

 The Hacker News 

Total
0
Shares
Previous Post

Police risk losing society’s trust in fight against cybercrime, warns Europol chief

Next Post

Estonian spy chief: ‘Hybrid schmybrid, what’s happening is attacks’

Related Posts

8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation

Source: The Nation A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated with the 8Base ransomware gang. Visitors to the data leak site are now greeted with a seizure banner that says: "This hidden site and the criminal content have been seized by the Bavarian State Criminal Police Office on behalf of the Office of the Public Prosecutor
Avatar
Read More

QakBot-Linked BC Malware Adds Enhanced DNS Tunneling and Remote Access Features

Cybersecurity researchers have disclosed details of a new BackConnect (BC) malware that has been developed by threat actors linked to the infamous QakBot loader. "BackConnect is a common feature or module utilized by threat actors to maintain persistence and perform tasks," Walmart's Cyber Intelligence team told The Hacker News. "The BackConnect(s) in use were 'DarkVNC' alongside the IcedID
Avatar
Read More