{"id":49418,"date":"2023-10-24T09:03:47","date_gmt":"2023-10-24T13:03:47","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=49418"},"modified":"2023-10-24T09:03:47","modified_gmt":"2023-10-24T13:03:47","slug":"android-most-dangerous-features","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/android-most-dangerous-features\/49418\/","title":{"rendered":"Top-3 most dangerous Android features"},"content":{"rendered":"<p>Android is a well-designed operating system that gets better and more secure with each new version. However, there are several features that may put your smartphone or tablet at serious risk of infection. Today, we take a look at the three that are the most dangerous of all \u2014 and how to minimize the risks when using them.<\/p>\n<h2>Accessibility<\/h2>\n<p>Accessibility is an extremely powerful set of Android features originally designed for people with severe visual impairments. To use smartphones, they need special apps that read on-screen text aloud, and respond to voice commands and convert them into taps on UI controls.<\/p>\n<p>For those with visual impairments, this function is not just useful \u2014 it\u2019s essential. But the very modus operandi of Accessibility is to grant an app access to everything that\u2019s going on in others. This violates the principle of strict isolation, which is a core security feature of Android.<\/p>\n<p>And it\u2019s not just tools for helping the visually impaired that take advantage of the Accessibility feature. For example, mobile antiviruses often use it to keep an eye out for anything suspicious taking place in other apps.<\/p>\n<p>But every coin has a flip side. For example, malicious apps can requests permission to access this feature set too. This isn\u2019t surprising, since such access makes it easy to spy on everything on your smartphone: read messages, steal credentials and financial data, intercept one-time transaction confirmation codes, and so on.<\/p>\n<p>What\u2019s more, access to this feature allows cybercriminals to perform user actions on the smartphone, such as tapping buttons and filling out forms. For instance, malware can fill out a transfer form in a banking app and confirm it with a one-time code from a text message, all on its own.<\/p>\n<p>Therefore, before you give an app access to Accessibility, always think carefully: do you really trust its developers?<\/p>\n<h2>Install unknown apps<\/h2>\n<p>By default, only the official store app has the right to install other programs on Android. Given an unmodified version of the system, this is, of course, Google Play. But together with (or instead of) Google Play, smartphone developers often use their own \u2014 such as Huawei AppGallery or Samsung Galaxy Store. Indeed, Android is a democratic operating system with no strict limitations on app download sources. You can easily <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">allow any app to download and install programs from anywhere<\/a>. But it\u2019s just as easy to get your smartphone infected with something nasty this way too, which is why we don\u2019t recommend using it.<\/p>\n<p>Official stores are usually the safest sources for downloading apps. Before being published in an official store, apps are subjected to security checks. And if it later transpires that malware has sneaked in, the dangerous app is quickly kicked out of the store.<\/p>\n<p>Sure, even Google Play is not totally immune to malware (alas, it gets in more often than we\u2019d like). Still, official stores at least try to keep their house in order \u2014 unlike third-party sites where malware is endemic, and the owners couldn\u2019t care less. A case in point: <a href=\"https:\/\/www.kaspersky.com\/blog\/infected-apkpure\/39273\/\" target=\"_blank\" rel=\"noopener nofollow\">attackers once even managed to infect the third-party Android app store itself<\/a>.<\/p>\n<p>The most important thing to remember is this: if you do decide you absolutely must download and install something on your Android smartphone not from the official app store \u2014 don\u2019t forget to disable the ability to do so immediately after the installation. It\u2019s also a good idea to scan your device afterward with a mobile antivirus to make sure no malware\u2019s appeared; the free version of our <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a> will do the job just fine.<\/p>\n<h2>Superuser rights (rooting)<\/h2>\n<p>Less popular than the two features above \u2014 but by no means less dangerous \u2014 is the ability to gain superuser rights in Android. This process is popularly known as \u201crooting\u201d (\u201croot\u201d is the name given to the superuser account in Linux).<\/p>\n<p>The designation is appropriate since <a href=\"https:\/\/www.kaspersky.com\/blog\/android-root-faq\/17135\/\" target=\"_blank\" rel=\"noopener nofollow\">superuser rights give superpowers<\/a> to anyone who gets them on the device. For the user, they open up the usually forbidden depths of Android. Superuser rights grant full access to the file system, network traffic, smartphone hardware, installation of any firmware, and much more.<\/p>\n<p>Again, there\u2019s a downside: if malware gets on a rooted smartphone, it too acquires superpowers. For this reason, rooting is a favored method of <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-pegasus-spyware\/43453\/\" target=\"_blank\" rel=\"noopener nofollow\">sophisticated spyware apps<\/a> used by many government intelligence agencies \u2014 as well as <a href=\"https:\/\/www.kaspersky.com\/blog\/monitorminor-stalkerware\/34060\/\" target=\"_blank\" rel=\"noopener nofollow\">cutting-edge stalkerware<\/a> that\u2019s accessible to regular users.<\/p>\n<p>Therefore, we strongly discourage rooting your Android smartphone or tablet \u2014 unless you\u2019re an expert with a clear understanding of how the operating system works.<\/p>\n<h2>How Android users can stay safe<\/h2>\n<p>Lastly, a few tips on how to stay safe:<\/p>\n<ul>\n<li>Be wary of apps that request access to Accessibility.<\/li>\n<li>Try to install apps only from official stores. Yes, you can come across malware there too, but it\u2019s still much safer than using alternative sites where no one is responsible for security.<\/li>\n<li>If you do install an app from a third-party source, don\u2019t forget to disable \u201cInstall unknown apps\u201d immediately afterward.<\/li>\n<li>Never use rooted Android unless you fully understand how root permissions work.<\/li>\n<li>Make sure you install <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">reliable protection<\/a> on all your Android devices.<\/li>\n<li>If you use the free version of our security solution, remember to manually run a scan from time to time. In the paid version of <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a>, scanning takes place automatically.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>The three most dangerous Android features that make your smartphone much more vulnerable to malware.<\/p>\n","protected":false},"author":2726,"featured_media":49420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683,9],"tags":[105,1917,423,2535,97,835,45,714,422,131,723],"class_list":{"0":"post-49418","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-android","10":"tag-app-permissions","11":"tag-mobile-devices","12":"tag-root","13":"tag-security-2","14":"tag-settings","15":"tag-smartphones","16":"tag-spyware","17":"tag-threats","18":"tag-tips","19":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/android-most-dangerous-features\/49418\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/android-most-dangerous-features\/26544\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/android-most-dangerous-features\/21971\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/android-most-dangerous-features\/29240\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/android-most-dangerous-features\/26817\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/android-most-dangerous-features\/26801\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/android-most-dangerous-features\/29287\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/android-most-dangerous-features\/28159\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/android-most-dangerous-features\/36455\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/android-most-dangerous-features\/21146\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/android-most-dangerous-features\/21950\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/android-most-dangerous-features\/30628\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/android-most-dangerous-features\/35060\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/android-most-dangerous-features\/28917\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/android-most-dangerous-features\/27109\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/android-most-dangerous-features\/32823\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/android-most-dangerous-features\/32471\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=49418"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49418\/revisions"}],"predecessor-version":[{"id":49421,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49418\/revisions\/49421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/49420"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=49418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=49418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=49418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}