{"id":24709,"date":"2024-06-18T09:10:20","date_gmt":"2024-06-18T17:10:20","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/06\/18\/news-18439\/"},"modified":"2024-06-18T09:10:20","modified_gmt":"2024-06-18T17:10:20","slug":"news-18439","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/06\/18\/news-18439\/","title":{"rendered":"Explained: Android overlays and how they are used to trick people"},"content":{"rendered":"\n<p>Sometimes you\u2019ll see the term &#8220;overlays&#8221; used in articles about malware and you might wonder what they are. In this post we will try to explain what overlays\u2014particularly on Android devices\u2014are, and how cybercriminals deploy them.<\/p>\n<p>Most of the time, overlays are used to make people think they are visiting a legitimate website or using a trusted app while in reality they are not.<\/p>\n<p>Simply put, the Android overlay is a feature used by an app to appear on top of another app. The legitimate use of overlays is to offer functionality to the app\u2019s user without them having to leave the app itself, for example for messages or alerts, such as <a href=\"https:\/\/www.facebook.com\/help\/messenger-app\/1611232179138526\">Android bubbles on Messenger<\/a>.<\/p>\n<p>The possible malicious use of overlays, then, is not hard to guess. Overlays can be used to draw a full window on top of a legitimate app and, as such, intercept all the interactions the user has with the app. But they can also be superimposed over certain critical areas of an app like the text in a message box.<\/p>\n<p>Some examples of malicious uses of overlays:<\/p>\n<ul>\n<li>Requesting permissions under false pretenses, malicious apps can hide their requests by covering the legitimate app\u2019s permissions text.<\/li>\n<li>Clickjacking, where a user is tricked into clicking on actionable content thinking they are interacting with a legitimate app.<\/li>\n<li>Intercepting information like login credentials and even <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/05\/scammers-can-easily-phish-your-multi-factor-authentication-codes-heres-how-to-avoid-it\">some multi-factor authentication (MFA) tokens<\/a>, by making the user think they are entering them on a legitimate app or website.<\/li>\n<\/ul>\n<p>Whether the overlays are transparent or whether they mimic the legitimate app does not influence the way they work. As long as they blend with the original application\u2019s interface, they are incredibly hard to spot.<\/p>\n<p>Most of the time, a malicious overlay&#8217;s goal is to intercept certain user data which enables cybercriminals to steal money or cryptocurrencies. This is why many banking apps have protection in place. In modern Android versions, developers can successfully block any non-system Android overlay to protect against overlay attacks.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-protection-against-overlays\">Protection against overlays<\/h3>\n<p>As we said, screen overlay attacks are most common on Android devices, and they are a significant threat, so we will explain how you can check which apps have the permission to use overlays and how you can disable it.<\/p>\n<p>Tap<strong> Settings<\/strong> &gt; <strong>Apps<\/strong> &gt; <strong>Options<\/strong> (three stacked dots) &gt; <strong>Special access<\/strong> &gt; <strong>Appear on top<\/strong>. Here you can see a list of apps with the permission to \u201cAppear on top\u201d and you can disable the ones you don\u2019t recognize or don\u2019t need to have this permission.<\/p>\n<p>Using an anti-malware solution for your Android device will be effective against known malicious apps. You can uninstall these apps using the mobile device&#8217;s uninstall functionality, but the tricky part lies in identifying the offending behavior and app. That is where <a href=\"https:\/\/www.malwarebytes.com\/mobile\">Malwarebytes for Android<\/a> can help\u2014by identifying these apps and removing them.<\/p>\n<p>It also helps to use authentication methods which are harder to phish. MFA is vital to enable, and will protect you from many types of attacks, so please continue to use it. However, <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/05\/scammers-can-easily-phish-your-multi-factor-authentication-codes-heres-how-to-avoid-it\">authentication-in-the-middle<\/a> attacks only work with certain types of MFA, and <a href=\"https:\/\/www.malwarebytes.com\/blog\/explained\/2024\/05\/you-get-a-passkey-you-get-a-passkey-everyone-should-get-a-passkey\">passkeys<\/a> for example won\u2019t allow the cybercriminals to login to your account in this way.<\/p>\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don\u2019t just report on phone security\u2014we provide it<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by\u00a0<a href=\"https:\/\/www.malwarebytes.com\/ios\">downloading Malwarebytes for iOS<\/a>, and <a href=\"https:\/\/www.malwarebytes.com\/android\">Malwarebytes for Android<\/a> today.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/06\/explained-android-overlays-and-how-they-are-used-to-trick-people\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Despite existing countermeasures, Android overlays are still used in malware attacks and phishing. What are they and what can we do? <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,20894,10600,32,25078,27720],"class_list":["post-24709","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-clickjacking","tag-mfa","tag-news","tag-overlays","tag-passkeys"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24709"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24709\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24709"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}