Google is unveiling a set of new features in Android 15 to stop malicious apps set up on the machine from capturing sensitive info.
This constitutes an update to the Perform Integrity API that 3rd-party app developers can get gain of to safe their programs from malware.
“Developers can verify if there are other apps functioning that could be capturing the display, creating overlays, or controlling the gadget,” Dave Kleidermacher, vice president of engineering for Android security and privacy, said.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
“This is beneficial for apps that want to hide sensitive information from other applications and guard customers from ripoffs.”
On top of that, the Participate in Integrity API can be utilized to look at if Google Engage in Guard is active and if the user’s product is no cost of recognised malware in advance of carrying out delicate actions or dealing with sensitive knowledge.
Google, with Android 13, launched a function identified as restricted settings that by default blocks sideloaded applications from accessing notifications and requesting accessibility expert services permissions.
In the most up-to-date iteration of the cellular operating program, the function is becoming expanded by looking for user acceptance prior to enabling permissions when putting in an application by using sideloading from web browsers, messaging apps, and file managers.
“Builders can also choose-in to get new system activity to verify if a gadget is creating too numerous integrity checks, which could be a sign of an attack,” Kleidermacher added.
The improvements are squarely aimed at Android banking trojans that are regarded to abuse their permissions to the accessibility expert services API to perform overlay attacks and change off security mechanisms on the unit to harvest precious knowledge.
That explained, Android malware these kinds of as Anatsa has been noticed circumventing limited options in current months, indicating continued attempts on the component of threat actors to devise techniques to breach security guardrails.
“We’re continually doing the job on bettering and evolving our protections to stay forward of poor actors,” a Google spokesperson explained to The Hacker News.
“We just lately started piloting enhanced fraud protection with Google Participate in Protect, in international locations the place internet-sideloaded destructive application installs are widespread. Increased fraud safety will block installs from Internet-sideloaded resources (messaging applications, sites, file administrators), that use permissions usually abused for economic fraud. This pilot is dwell in Singapore and Thailand.”
Together with efforts to fight fraud and cons, Google is also stepping up mobile security by alerting people if their mobile network link is unencrypted and if a bogus mobile foundation station or surveillance instrument (e.g., stingrays) is recording their location using a device identifier.
The tech large claimed it can be working closely with ecosystem companions, which includes initial tools brands (OEMs), to empower these options to customers above the up coming pair of several years.
Which is not all. The organization is tightening controls for display sharing in Android 15 by instantly hiding notification information, consequently stopping 1-time passwords (OTPs) sent via SMS messages from getting displayed during monitor sharing.
“With the exception of a handful of forms of applications, this kind of as wearable companion applications, just one-time passwords are now hidden from notifications, closing a widespread attack vector for fraud and adware,” Kleidermacher said.
Rounding off the new fraud and rip-off defense capabilities, Google stated it is diversifying Play Protect’s on-machine AI capabilities with reside threat detection to better detect malicious apps. The strategy leverages the Personal Compute Main (PCC) to flag anomalous designs on the device.
“With stay menace detection, Google Play Protect’s on-machine AI will assess supplemental behavioral alerts connected to the use of delicate permissions and interactions with other apps and expert services,” Kleidermacher stated.
“If suspicious actions is learned, Google Play Protect can deliver the app to Google for additional evaluate and then warn buyers or disable the application if malicious behavior is confirmed.”
Stay risk detection also builds on a just lately added functionality that permits for authentic-time scanning at the code-stage to combat novel destructive apps and enable location rising threats.
Identified this write-up intriguing? Abide by us on Twitter and LinkedIn to read more distinctive material we write-up.
Some sections of this write-up are sourced from:
thehackernews.com