New Tech Can Spot Hidden Malware on Your Android Phone
11:33:28 2025-04-07 229

Researchers have build a new tool to spot malware exploiting phone accessibility features and help users remove it.

Accessibility features like screen readers and voice-to-text have made smartphones more usable for people with disabilities. However, these same tools can also be exploited by hackers.

Malware can take advantage of accessibility services to read on-screen content and perform unauthorized actions, such as tapping buttons, approving transactions, or even blocking attempts to remove the malware. In some cases, this can lead to severe consequences, like unauthorized transfers from banking apps or persistent infections that are difficult to uninstall.

Often, the malware is installed when a user clicks on a phishing link or unknowingly downloads a malicious app, even from seemingly legitimate sources like the Google Play Store. Once installed, it can compromise sensitive apps, including cryptocurrency wallets and rideshare platforms that store payment information.

Researchers at Georgia Tech have developed a new tool, Detector of Victim-specific Accessibility (DVa), that can check for malware. DVa runs on the cloud to check the phone for this malware, then sends the user a report of its findings that shows which apps are malware and how to delete them. It will also tell them which victim apps the malware was targeting and how to contact those companies to check for damages. DVa also sends a report to Google, so the company can attempt to eradicate this malware from apps.

“As we continue to design systems that are more and more accessible, we also need security experts in the room,” said Brendan Saltaformaggio, an associate professor in the School of Cybersecurity and Privacy (SCP) and the School of Electrical and Computer Engineering. “Because if we don’t, they’re going to get abused by hackers.”

Modeling Malware

To determine how vulnerable smartphones are to this type of hack, the team set up five Google Pixel phones and performed a malware analysis. The Georgia Tech researchers teamed up with Netskope — an industry leader in cloud, data, and network security — to help protect smartphones everywhere from this type of powerful malware. Then they installed some of the sample malware on each phone to see how it debilitated the system and used DVa to report this behavior.

While DVa can detect current attacks, the researchers note the challenge is ensuring that removing malware doesn’t remove accessibility.

“In the future, we need to look at how accessibility services work overall to figure out what’s fundamentally different from a benign use and a malicious use,” said Haichuan (Ken) Xu, a Ph.D. student in SCP.

Reality Of Islam

A Mathematical Approach to the Quran

10:52:33   2024-02-16  

mediation

2:36:46   2023-06-04  

what Allah hates the most

5:1:47   2023-06-01  

allahs fort

11:41:7   2023-05-30  

striving for success

2:35:47   2023-06-04  

Imam Ali Describes the Holy Quran

5:0:38   2023-06-01  

livelihood

11:40:13   2023-05-30  

silence about wisdom

3:36:19   2023-05-29  

MOST VIEWS

Importance of Media

9:3:43   2018-11-05

Illuminations

your life

2:11:12   2022-10-15

teaching

3:43:50   2022-11-05

be creative

8:25:12   2022-03-09

prophet adam & the apple

1:16:44   2018-05-14

your children

7:32:24   2022-02-14

the 1st ever brothers

6:14:17   2018-06-21

loyalty is strength

10:55:53   2022-06-13



IMmORTAL Words
LATEST Use your brain so you do not lose it Interpretation of Sura Hud - Verses 63-65 Message of the Month of Mourning Exposure to Daylight Boosts the Immune System, Study Suggests This Laser Breakthrough Can Read Text on a Page from a Mile Away UN Warns: High Odds We Will Exceed 1.5°C Temp Rise by 2029 Be Creative with New and Unconventional Ideas and Solutions Interpretation of Sura Hud - Verses 60-62 Lessons from the Martyrdom of Imam Husayn (A.S.) Your Heart Begins to Suffer After Just 3 Nights of Bad Sleep New AI Weather Tool Outperforms Global Forecasting Centers New Jersey Hawk Develops Clever Hunting Strategy Using Traffic Signals