tapjacking

AppWizard
February 19, 2026
Google blocked over 255,000 Android apps from gaining excessive access to sensitive user data and rejected more than 1.75 million apps from publication on Google Play due to policy violations. The company banned over 80,000 "bad developer accounts" and detected more than 1.75 million policy-violating apps. Google blocked 160 million spam ratings to prevent an average 0.5-star drop in targeted apps. Play Protect scans over 350 billion apps daily, identifying over 27 million malicious apps sideloaded from outside Google Play, and successfully blocked 266 million installation attempts from 872,000 unique risky apps. The Play Integrity API processes over 20 billion checks daily, and new hardware-backed signals and in-app remediation prompts were introduced in 2025. Android 16 includes built-in protections against “tapjacking attacks.”
AppWizard
February 19, 2026
Google has reported significant improvements in app security for Android in 2025, preventing over 1.75 million policy-violating apps from entering the Play Store and removing more than 80,000 developer accounts attempting to distribute malware. The integration of AI models into the app review process has enhanced the speed and accuracy of identifying malicious patterns. Additionally, Google blocked over 255,000 apps from requesting unnecessary sensitive data and eliminated 160 million spam ratings and reviews. Google Play Protect now evaluates over 350 billion apps daily, identifying 27 million new malicious apps outside the Play Store and blocking 266 million risky installation attempts across 185 markets. A new measure has been implemented to prevent users from disabling Play Protect during phone calls to combat social engineering tactics. Future plans include democratizing developer verification and simplifying protection against "tapjacking" attacks in Android 16.
AppWizard
July 12, 2025
A new tapjacking technique called TapTrap can exploit user interface animations on Android devices, bypassing the permission system and potentially allowing access to sensitive data or harmful actions. TapTrap operates with zero-permission applications, layering a transparent activity over a malicious one. This vulnerability exists in both Android 15 and 16. Developed by researchers from TU Wien and the University of Bayreuth, TapTrap manipulates activity transitions using custom low-opacity animations, making risky prompts nearly invisible to users. An analysis of nearly 100,000 apps revealed that 76% are vulnerable to TapTrap due to specific conditions related to activity launching and animation handling. The attack has been confirmed on Android 16, including tests on a Google Pixel 8a. GrapheneOS has acknowledged its vulnerability to TapTrap and plans to include a fix in its next release. Google is aware of the issue and intends to address it in a future update.
Search