Learn how to protect your apps against the new Android overlay threat

July 1, 2021
Learn how to protect your apps against the new Android overlay threat

What is the Android overlay threat, and how can you mitigate the risks?

In today’s world of increased mobility for everyone, the accelerating use of mobile platforms for the storage, manipulation and transport of sensitive personal and corporate data has become inevitable. Already, use of this technology has opened up significant levels of data leakage from devices readily available in the marketplace, which are being exploited for mal intent. This is having a significant affect on industry worldwide, especially in the financial sectors.

Android OS presently accounts for almost 85% of that global mobile handset market (Gartner/Nov 2015) presenting a significant challenge for security from data leakage. Highlighted by one of the more recently discovered vulnerabilities, the Android Overlay Threat (also referred to as Slempo, Slembunk, Mazarbot, Gm-bot), which affects the Android platform. This puts over 97% of those Android devices at potential risk through the use of its open systems architecture. This mobile platform is targeted because of its ubiquitous use.

What is the Android overlay threat?

Simply put, the application overlay Malware inserts an invisible observation layer between the app and the handset’s screen. This could mean user data input could be copied, and/or the user to be encouraged into disabling security features by disguising the true nature of the interface’s capability as a more mundane feature. Which could allow the handset to be open to attack from other vectors.

Often the Malware is targeted at specific types of the applications of interest e.g. Banking/Finance/VPN. When those apps are launched the overlay deploys as a replicate version of the original application to perform its intended task. The Android Overlay Threat targets the system as a genuine user of system resources, in such a way that they are complex to detect.

Android OS versions affected:  All versions up to Version 5.1.

The footprints of the Android overlay threat

There are three different known attack types using application overlays on Android, they operate in the following ways:

  1. A window that covers all or parts of the screen that displays something, but doesn’t intercept user touch events.
  2. A window that covers parts of the screen to overlay parts of an application in the foreground, which does intercept user touch events. E.g. Click-jacking attacks where the user is invisibly duped into an action not normally undertaken e.g. disabling a security feature.
  3. Launch a new activity that looks like the app in the foreground and completely overlay it. This is the easiest and most powerful method since it gives the attacker full control without the need to perfectly adjust to the app's UI.

The Android Overlay Threat appears as genuine system requests, making detection of the problem more complex since access to the system is a bona fide request, which is often granted with little or no user permissions checking. The attacker does need to have some intelligence of the system to be successful; certain items of information are required in order to mount an attack. The degree of difficulty varies depending on the version of Android OS.

Defense against the Android overlay threat

App shielding into the application allows us to significantly enhance control of the application’s environment and take measures to mitigate the onward data theft threat. Reducing attacker success and risk posed by this threat. The nature of the Android Overlay Threat makes it important to make app shielding and the additional enhancements part of your security policy.

For developers looking for a comprehensive and seamless game protection solution, JikGuard Game Protection offers cutting-edge encryption and anti-cheat technology to ensure your game remains secure without compromising performance. JikGuard offers security mechanisms such as:

On-Demand Security Assessment:

Not sure if your game needs encryption? JikGuard provides free security testing and reports, helping you identify potential risks through penetration testing and in-depth analysis.

Minimal Performance Impact:

JikGuard’s encryption system only decrypts resources when needed, ensuring that files remain encrypted in the cache and have virtually no effect on loading speed or game smoothness.

Seamless Multi-Channel Packaging:

Supports mother package encryption, meaning all sub-packages remain protected without requiring additional processing for different distribution channels.

No SDK Required:

Unlike traditional solutions, JikGuard does not require SDK integration—simply run a command, and the encryption process is handled automatically.

Ultra-Low Performance Overhead:

▪ CPU usage increase: <0.2%
▪ Memory consumption: <1MB
▪ Startup time increase: <25ms
▪ Package size increase: <1.3MB
Ensuring a smooth and seamless gaming experience.

With JikGuard Game Protection, you can focus on game development while ensuring top-tier security against cheats, resource leaks, and competitive analysis. Protect your game today and keep your vision intact!
 

JikGuard.com, a high-tech security service provider focusing on game protection and anti-cheat, is committed to helping game companies solve the problem of cheats and hacks, and providing deeply integrated encryption protection solutions for games.

Explore Features>>