Categories: Uncategorized

New Android attack tricks you into giving dangerous permissions

A team of academic researchers has uncovered a new Android security exploit that raises a lot of questions about the platform’s permission system. The technique, named TapTrap, uses user interface animations to visually deceive you into granting sensitive permissions or performing harmful actions. Unlike earlier tapjacking attacks, TapTrap Android attack works by launching transparent system prompts over regular app interfaces. The result is a near-invisible layer that silently captures your taps and interactions.

 Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUD

As reported by Bleeping Computer, TapTrap takes advantage of how Android handles activity transitions between apps. A malicious app can launch a system-level screen using the standard start Activity function but modify how the screen appears using a custom animation. By setting both the start and end opacity to a very low value, such as 0.01, the activity becomes nearly invisible to the user.

Touch input is still fully registered by the transparent screen, even though users only see the visible app underneath. Attackers can also apply a scaling animation that enlarges a specific user interface element, such as a permission button, so that it fills the screen. This increases the chance that a user will unknowingly tap the button.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The researchers released a video showing how this technique could be used in a gaming app to quietly launch a Chrome browser permission prompt. The prompt asks for camera access, and the user taps “Allow” without realizing what they have done. Because the malicious screen is transparent, there are no visual cues to suggest anything suspicious is happening.

To assess how widespread the vulnerability might be, the researchers tested nearly 100,000 apps from the Play Store. About 76% were found to be potentially vulnerable, not because they are malicious, but because they lack key safeguards. These apps had at least one screen that could be launched by another app, shared the same task stack, failed to override the default transition animation, and did not block user input during the transition.

Android enables these animations by default. Users can only disable them through settings that are typically hidden, such as Developer Options or Accessibility menus. Even the latest Android version, tested on a Google Pixel 8a, remains unprotected against this exploit.

GrapheneOS, a security-focused operating system based on Android, confirmed that its current version is also affected. However, it plans to release a fix in its next update.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Google has acknowledged the issue and said a future Android update will contain a mitigation. While no exact timeline has been announced, Google is expected to change how input and animations are handled to prevent invisible tap interception.

The company added that developers must follow strict Play Store policies and that any app found abusing this vulnerability will face enforcement actions. 

1) Consider a mobile security app: Use a trusted antivirus or mobile security app that can detect suspicious behavior or alert you to apps using overlays or accessibility features improperly.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech

2) Be selective about the apps you install: Avoid installing apps just because they’re trending or have flashy ads. Check developer credibility, recent reviews and app permissions before downloading.

3) Stick to the Google Play Store: While not perfect, the Play Store has better safeguards than random APK sources. Avoid installing apps from third-party stores or unknown websites.

4) Pause before granting permissions: If an app suddenly asks for access to your camera, microphone, or other sensitive features, take a moment. Always ask yourself if this app really needs this permission right now.

TapTrap shows that security threats do not always come from complex code or aggressive malware. Sometimes, small oversights in visual behavior can open paths for serious abuse. In this case, the danger lies in what users do not see. People trust what they can see on their screens. This attack breaks that link by creating a visual mismatch between intent and outcome.

Do you trust the apps you install from the Play Store, or do you dig deeper before downloading? Let us know by writing us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

Copyright 2025 CyberGuy.com.  All rights reserved.

Devank Shrivastava

Share
Published by
Devank Shrivastava

Recent Posts

Clean up your social media feed and cut the noise

Scrolling used to be relaxing. Now it often feels chaotic. That is not a coincidence.…

6 hours ago

Why physical ID theft is harder to fix than credit card fraud

It started with a voicemail from a Hertz rental car location in Miami, Florida. A…

6 hours ago

Robinhood text scam warning: Do not call this number

Most scam texts are easy to spot, but this one feels different. At first glance,…

1 day ago

World’s fastest humanoid robot runs 22 MPH

A full-size humanoid robot just ran faster than most people will ever sprint. Chinese robotics firm…

1 day ago

Woman owes $3,556 for cruise she already paid for after falling victim to elaborate Zelle scam

A family vacation turned into a five-year nightmare. And it started with one payment.L. Williams…

1 day ago

China unveils the world’s largest flying car

China just sent a clear signal about where it believes air travel is headed next.…

1 day ago