A critical new warning for Android customers, with new Play Retailer malware actively exploiting a “very harmful” telephone setting. House owners of smartphones—even secured Samsung, Google, Xiaomi and Huawei fashions, ought to verify that this setting has not already been exploited on their telephones. Right here’s what it’s worthwhile to do right this moment.

New warning for Android customers after harmful notification setting is exploited.
Getty
It’s a stupidly easy methodology of assault, and one which shouldn’t be doable—not in 2021, not on an Android telephone carrying the newest firmware and safety updates, and never by means of an set up from the seemingly protected Play Retailer. However it was doable—it’s precisely what occurred. A malicious app evading Google’s defences, mechanically messaging a consumer’s contacts on WhatsApp, frequently infecting because it did so.
This malware was caught exploiting a reasonably effectively hidden Android setting—and that is the second such warning already this yr. All of a sudden it’s worthwhile to verify that no apps have been granted permission to make use of this setting in your telephone, apart from system apps or these from extremely trusted sources. You will discover particulars on how to do that beneath.
In accordance with the staff at Check Point that found this newest menace, the malware “performs a spread of malicious actions, together with information and credential theft.” The staff warns that this raises “some critical crimson flags” over Play Retailer’s safety, and that though this specific assault has been stopped, “the malware household is probably going right here to remain—the malware could return hidden in a special app.”
Final yr, Examine Level warned that Play Retailer’s safety enhancements “usually are not the place we hoped they’d be—Google is investing to battle malicious apps, however given the present state it’s not sufficient.” A yr on and right here we’re once more.
The specifics this time—a malicious Play Retailer app promising free entry to Netflix, which then sends out messages promising the identical—are much less attention-grabbing than the assault vector. As soon as put in, the FlixOnline app intercepted WhatsApp notifications when a brand new message had been acquired, sending an computerized reply with a malicious hyperlink to a pretend Netflix website that may phish for credentials and bank card particulars.

FlixOnline Malware on Google Play Retailer
Examine Level Analysis
The intense vulnerability is Android’s “Notification Listening Service,” which will be enabled by a permission a newly put in app tips customers into granting, and which is able to permit the app to intercept and manipulate incoming messages. “It’s very uncommon to discover a good use for this permission,” Examine Level’s Aviran Hazum tells me, “for probably the most half, this isn’t a requested permission by authentic apps.”
We noticed the same vulnerability in January and there’s even a prescient warning from way back to 2016. The distinction right here is {that a} malicious app was put in from the Play Retailer itself, fairly than a third-party retailer, and that’s very dangerous information certainly. This “new and modern malicious menace,” Examine Level says, was stopped shortly after just some hundred installs, but it surely ought to by no means have been enabled within the first place.
The assault vector is now very a lot public area. It’s out of the blue very actual—with two exploitations already this yr. It would virtually actually now be used many times, and it’s worthwhile to take steps to maintain your self protected.
This is among the “two mostly abused mechanisms in Android,” Hazum tells me, “largely used for spying.” It may also be used to mechanically push new infections, making it very harmful to those that have been contaminated and their contacts, Hazum factors out, explaining that the identical vulnerability was utilized by the notorious Joker malware, “to seize the content material of the verification SMS acquired by the Premium Service” which contaminated customers had been subscribed to with out their information.
“It is comparatively simple to hijack a notification’s predefined actions,” Hazum warns, “if the app has the Notification Listener permission. Not simply WhatsApp, however all apps. On this case, the actor hijacked notifications from WhatsApp, responding to messages with a hyperlink to a malicious APK, pretend information, phishing campaigns, and a lot extra.”
Google eliminated the errant app from its Play Retailer following Examine Level’s disclosure, telling me that this had been performed shortly and after comparatively few installs. However the vulnerability stays in place. WhatsApp was additionally approached for remark forward of publication, albeit the messaging app is just not at fault for this vulnerability.
This “abuse of a harmful mechanism,” Hazum says, “this NotificationListener service, which permits an app entry to all notifications and predefined actions on them,” may be very prone to be repeated. As ever, now the vulnerability is within the public area, and given the relative ease by which it may be exploited, it’s a really actual menace.
If Android customers desire a good instance of the place iOS is doing a greater job to guard its gadgets, then this looks as if a reasonably easy one. “Apple doesn’t permit a single app to view all notifications,” Hazum says, “that means that one of these assault wouldn’t have labored.” And so, whereas Android customers ought to verify their gadgets for FlixOnline, and delete the app if it’s discovered, they need to additionally verify their notification entry setting.

Notification Entry Settings
Android
It is best to verify every app that has been given notification entry permission, and my recommendation can be to restrict this to trusted system apps—for instance to allow don’t disturb performance or Android Auto. Put merely, I might strongly counsel you NEVER set up an app from Play Retailer or wherever else and permit it to entry your notifications—that’s far more private data and entry than is wholesome.
Life isn’t that easy, after all. Examine Level warns that FlixOnline “doesn’t state ‘Notification Listener’,” when it seeks consumer permission, “however opens the notification permission display screen itself—solely those that really learn the display screen will see that.” However now you know the way harmful this permission is, you’ll be able to maintain an eye fixed out for such ways, and sometimes verify the settings themselves.

Misleading Notification Entry Permission
Examine Level Analysis
This newest warning is available in two elements—and each ought to make sober studying for Android customers. First, Play Retailer’s defences stay defeatable, an issue that simply doesn’t appear to be resolvable. And, second, Android stays susceptible to OS exploration by means of its flexibility, its looser restrictions than iOS.
Given the “very harmful” potential that the NotificationListener service has, on condition that it has clearly been exploited within the wild, further controls and restrictions must be added instantly. Customers shouldn’t be left in danger from as easy an assault vector as this, not with the state of cell malware as dangerous as it’s.
There’s one other cautionary story right here as effectively, after all. Smartphone customers—whether or not Android or iOS—shouldn’t click on hyperlinks or obtain attachments texted or messaged from anybody, even buddies. A tiny fraction of smartphones carry security software to intercept and shield in opposition to such threats, it’s simply not definitely worth the danger.