الوضع الليلي
0
New Tech Can Spot Hidden Malware on Your Android Phone
11:33:28 2025-04-07 2228

Researchers have build a new tool to spot malware exploiting phone accessibility features and help users remove it.

Accessibility features like screen readers and voice-to-text have made smartphones more usable for people with disabilities. However, these same tools can also be exploited by hackers.

Malware can take advantage of accessibility services to read on-screen content and perform unauthorized actions, such as tapping buttons, approving transactions, or even blocking attempts to remove the malware. In some cases, this can lead to severe consequences, like unauthorized transfers from banking apps or persistent infections that are difficult to uninstall.

Often, the malware is installed when a user clicks on a phishing link or unknowingly downloads a malicious app, even from seemingly legitimate sources like the Google Play Store. Once installed, it can compromise sensitive apps, including cryptocurrency wallets and rideshare platforms that store payment information.

Researchers at Georgia Tech have developed a new tool, Detector of Victim-specific Accessibility (DVa), that can check for malware. DVa runs on the cloud to check the phone for this malware, then sends the user a report of its findings that shows which apps are malware and how to delete them. It will also tell them which victim apps the malware was targeting and how to contact those companies to check for damages. DVa also sends a report to Google, so the company can attempt to eradicate this malware from apps.

“As we continue to design systems that are more and more accessible, we also need security experts in the room,” said Brendan Saltaformaggio, an associate professor in the School of Cybersecurity and Privacy (SCP) and the School of Electrical and Computer Engineering. “Because if we don’t, they’re going to get abused by hackers.”

Modeling Malware

To determine how vulnerable smartphones are to this type of hack, the team set up five Google Pixel phones and performed a malware analysis. The Georgia Tech researchers teamed up with Netskope — an industry leader in cloud, data, and network security — to help protect smartphones everywhere from this type of powerful malware. Then they installed some of the sample malware on each phone to see how it debilitated the system and used DVa to report this behavior.

While DVa can detect current attacks, the researchers note the challenge is ensuring that removing malware doesn’t remove accessibility.

“In the future, we need to look at how accessibility services work overall to figure out what’s fundamentally different from a benign use and a malicious use,” said Haichuan (Ken) Xu, a Ph.D. student in SCP.

Foresight   2026-03-24
Reality Of Islam

Aligning Goals with Capacities

8:39:5   2026-04-28  

Concealing Weaknesses

11:13:45   2026-04-25  

The Shortest Road to Success

11:26:37   2026-04-18  

False Advantages and Distinctions

11:1:47   2026-04-12  

A Mathematical Approach to the Quran

10:52:33   2024-02-16  

mediation

2:36:46   2023-06-04  

what Allah hates the most

5:1:47   2023-06-01  

allahs fort

11:41:7   2023-05-30  

striving for success

2:35:47   2023-06-04  

Imam Ali Describes the Holy Quran

5:0:38   2023-06-01  

livelihood

11:40:13   2023-05-30  

silence about wisdom

3:36:19   2023-05-29  

MOST VIEWS

Importance of Media

9:3:43   2018-11-05

Illuminations

use you time well

4:26:43   2022-02-21

your thoughts

8:15:37   2023-02-16

belief cause cleanliness

10:47:11   2022-11-22

noah & his ark

7:59:14   2018-06-21

anti racism

9:30:2   2021-11-12

smiling

1:38:41   2021-12-08

your path

12:10:56   2022-11-17



IMmORTAL Words
LATEST This Common Habit Could Signal Serious Health Problems in Later Life These Tiny Robots 50x Smaller Than a Hair Can Hunt and Move Bacteria Bombardier beetles Fast food increases asthma, eczema risk in children Aligning Goals with Capacities Interpretation of Sura al-Nur - Verse 44 Hidden Danger: Widely Used Pesticides Linked to 150% Higher Cancer Risk Powerful Lasers Reveal How Matter Becomes Plasma in Trillionths of a Second Shoebill Kids With Autism May Be Less Likely to Imitate Silly Behavior Concealing Weaknesses Interpretation of Sura al-Nur - Verse 43