Story image

Android 'Toast' overlay vulnerability affects all versions prior to 8.0

11 Sep 2017

Android users are being urged to apply any security patches for their devices, after security researchers discovered a ‘high severity’ vulnerability in Toast.

The Android Toast overlay exploits all versions of Android prior to the latest version, Android Oreo. According to researchers at Unit 42, the vulnerability increases the likeliness of an overlay attack, although they are not aware of any attacks that have used the vulnerability.

Overlay attacks are already well-known on Android.

“An “overlay attack” is an attack where an attacker’s app draws a window over (or “overlays”) other windows and apps running on the device. When done successfully, this can enable an attacker to convince the user he or she is clicking one window when, in fact, he or she is actually clicking another window,” Unit 42 researcher Christopher Budd explains.

They are used to install malicious software on an Android device in order to control or ‘brick’ it, steal information, demand ransoms or do all of those things in one swoop.

Overlay attacks can also be used to create denial-of-services on the device by opening windows that cannot be closed – a key use for the way ransomware attacks are conducted.

Previously, it was believed that malicious apps that attempt to conduct overlay attacks had to explicitly request the ‘draw on top’ permission from the user, and the apps must be installed through Google Play.

Because of these two factors, overlay attacks were previously ruled a non-serious threat. However, researchers say that overlay attacks can occur without those two conditions. 

Android devices are built with a feature called ‘Toast’, which is a notification that pops up on the screen. It is generally used to show notifications and messages over apps.

Toast does not require the same permissions as other Android window types and it is also able to overlay the entire screen.

“If a malicious app were to utilize this new vulnerability, our researchers have found it could carry out an overlay attack simply by being installed on the device. In particular, this means that malicious apps from websites and app stores other than Google Play can carry out overlay attacks. It’s important to note that apps from websites and app stores other than Google Play form a significant source of Android malware worldwide,” Budd explains.

While Budd says that Android Oreo is immune from the vulnerability, but all Android users before 8.0 should contact their handset maker or mobile carrier for the latest updates.

“Of course, one of the best protections against malicious apps is to get your Android apps only from Google Play, as the Android Security Team aggressively screens against malicious apps and keeps them out of the store in the first place,” Budd concludes.

New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.