TapTrap Android Exploit Allows Malicious Apps to Bypass Permissions
A new Android vulnerability called TapTrap that allows malicious apps to bypass the operating system’s permission system without requiring any special permissions themselves.
The attack exploits activity transition animations—a core feature of Android’s user interface—to trick users into unknowingly granting sensitive permissions or performing destructive actions.
Unlike traditional tapjacking attacks that rely on malicious overlays, TapTrap uses a fundamentally different approach by manipulating the animations that occur when switching between app activities.
The attack creates a mismatch between what users see on their screen and the app’s actual state, making it virtually undetectable during normal use.
The TapTrap attack is particularly concerning because it requires no permissions to execute, making malicious apps appear completely harmless to users.
Researchers from TU Wien analyzed 99,705 apps from the Google Play Store and found that 76.3% of them are vulnerable to this attack method.
The attack works by using custom activity transition animations with extremely low opacity values (around 0.01 alpha) to make sensitive permission dialogs nearly invisible while still allowing them to receive touch events.
When users interact with what appears to be the malicious app’s interface, they are actually tapping on hidden system dialogs or sensitive UI elements.
During the attack window of up to 6 seconds—doubled due to an off-by-one error in Android animation duration restriction—attackers can successfully trick users into granting permissions for accessing the camera, microphone, location data, contacts, and notifications.
The attack can even escalate to obtaining device administrator privileges, enabling complete device control including factory resets without user knowledge.
TapTrap Android Exploit
What makes TapTrap particularly dangerous is its ability to bypass all existing tapjacking mitigations implemented in Android.

The operating system’s current defenses, including overlay detection mechanisms, toast restrictions, and system-wide tapjacking prevention introduced in Android 12, are ineffective against this attack because they specifically target overlay-based attacks.
The researchers discovered that TapTrap affects not only Android system components but also extends to web browsers through Custom Tabs.
Their analysis of 10 popular mobile browsers found that 8 are vulnerable to permission bypass attacks, while the attack also enables traditional web clickjacking despite existing browser protections like X-Frame-Options headers.
In a user study with 20 participants, researchers found that all participants failed to detect at least one attack variant, even after being explicitly warned about the possibility of an attack.
While Chrome and Firefox have implemented fixes by using the onEnterAnimationComplete
method, Android 15 remains vulnerable as of June 2025, with no timeline provided for a system-level fix.
Only 21% of uninformed users noticed security indicators like camera access notifications, demonstrating the attack’s stealth capabilities.
Security Gap Remains Unpatched
The research team responsibly disclosed their findings to Google’s Android Security Team and affected browser vendors in October 2024.
The vulnerability has been assigned two CVEs, with Chrome awarding the researchers a $10,000 bug bounty for the discovery.
The researchers found no evidence of TapTrap being exploited in the wild among their analysis of nearly 100,000 apps, suggesting this represents a previously unexplored attack vector.
To mitigate TapTrap, the researchers propose system-level solutions including blocking touch events during low-opacity animations and limiting zoom factors in activity transitions.
They recommend implementing an opacity threshold of 0.2 and a maximum zoom factor of 400% for legitimate animations while preventing abuse.
The discovery highlights a fundamental gap in Android’s security model, as the attack exploits legitimate system functionality rather than relying on malicious overlays, making it extremely difficult to detect and prevent with current approaches.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
Source link