• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse

You are here: Home / General Cyber Security News / Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
March 16, 2026

Android Accessibility API Security

Google is testing a new security feature as part of Android Advanced Protection Mode (AAPM) that prevents certain kinds of apps from using the accessibility services API.

The change, incorporated in Android 17 Beta 2, was first reported by Android Authority last week.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


AAPM was introduced by Google in Android 16, released last year. When enabled, it causes the device to enter a heightened security state to guard against sophisticated cyber attacks. Like Apple’s Lockdown Mode, the opt-in feature prioritizes security at the cost of diminished functionality and usability so as to minimize the attack surface.

Cybersecurity

Some of the core configurations include blocking app installation from unknown sources, restricting USB data signaling, and mandating Google Play Protect scanning.

“Developers can integrate with this feature using the AdvancedProtectionManager API to detect the mode’s status, enabling applications to automatically adopt a hardened security posture or restrict high-risk functionality when a user has opted in,” Google noted in its documentation outlining Android 17’s features.

The latest restriction added to the one-tap security setting aims to prevent apps that are not classified as accessibility tools from being able to leverage the operating system’s accessibility services API. Verified accessibility tools, identified by the isAccessibilityTool=”true” flag, are exempted from this rule.

According to Google, only screen readers, switch-based input systems, voice-based input tools, and Braille-based access programs are designated as accessibility tools. Antivirus software, automation tools, assistants, monitoring apps, cleaners, password managers, and launchers do not fall under this category.

While AccessibilityService has its legitimate use cases, such as assisting users with disabilities in using Android devices and apps, the API has been extensively abused by bad actors in recent years to steal sensitive data from compromised Android devices.

Cybersecurity

With the latest change, any non-accessibility app that already has the permission will have its privileges automatically revoked when AAPM is active. Users will also not be able to grant apps permissions to the API unless the setting is turned off.

Android 17 also comes with a new contacts picker that allows app developers to specify only the fields they want to access from a user’s contact list (e.g., phone numbers or email addresses) or allow users to select certain contacts with a third-party app.

“This grants your app read access to only the selected data, ensuring granular control while providing a consistent user experience with built-in search, profile switching, and multi-selection capabilities without having to build or maintain the UI,” Google said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «openclaw ai agent flaws could enable prompt injection and data OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
  • OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
  • GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
  • Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
  • Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
  • INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
  • Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
  • Investigating a New Click-Fix Variant
  • Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
  • Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

Copyright © TheCyberSecurity.News, All Rights Reserved.