Cyber Security News

Threat Actors Using Malware Loaders To Bypass Android 13+ Accessibility Restrictions

Cybercriminals have successfully circumvented Google’s Android 13 security enhancements designed to prevent malicious applications from abusing accessibility services, according to recent threat intelligence findings.

The tech giant implemented these restrictions specifically to block accessibility access for sideloaded applications, a measure that initially showed promise in reducing malware distribution that exploited this sensitive system feature.

However, threat actors have rapidly adapted their tactics by deploying sophisticated session-based package installers, effectively neutralizing Google’s protective measures and enabling continued deployment of malicious payloads.

This development represents a significant escalation in the ongoing cat-and-mouse game between platform security teams and cybercriminal organizations seeking to exploit mobile banking and financial applications.

Intel471 analysts identified that one of the most prominent examples of this evasion technique is TiramisuDropper, which has gained widespread adoption among operators of Android banking trojans including Hook, TgToxic, and TrickMo.

The loader’s effectiveness has made it a preferred tool for distributing various malware families across the underground ecosystem, demonstrating the adaptability and persistence of modern threat actors in overcoming platform-level security controls.

The implications of these bypass techniques extend far beyond individual device infections, as they enable large-scale fraud campaigns targeting financial institutions and their customers.

Traditional detection methods struggle to identify these loaders due to their sophisticated evasion capabilities and the legitimate appearance of their installation processes, creating significant challenges for both endpoint security solutions and mobile device management platforms.

Loader Distribution Mechanisms

The technical architecture underlying these accessibility restriction bypasses reveals a sophisticated understanding of Android’s security model and installation processes.

Data collected from April 4, 2024, to December 31, 2024, shows that TiramisuDropper facilitated the distribution of multiple malware families, with Hook accounting for 29.9% of observed infections, followed by TgToxic at 22% and TrickMo at 14.8%.

Malware Families Sideloaded Using Tiramisu Dropper (Source – Intel471)

The above distribution breakdown shows the prevalence of banking-focused malware strains leveraging this loader technology.

The remaining infections comprised Coper (12%), Medusa (11.7%), Spynote (6.9%), and other variants including Tremendous and Ermac, collectively representing the diverse ecosystem of Android malware benefiting from these evasion techniques.

The emergence of the Brokewell Android loader in April 2024 further accelerated this trend when actor Samedit_Marais, also known as BaronSamedit, publicly released its source code on the Exploit cybercrime forum.

This open-source approach enabled widespread integration of accessibility bypass capabilities into existing malware frameworks, potentially triggering a significant increase in variants designed to evade Android’s defensive measures.

Security researchers anticipate that existing “dropper-as-a-service” providers will face substantial disruption as these bypass techniques become commoditized, forcing them to either cease operations or undergo significant restructuring to maintain competitive advantages.

This democratization of advanced evasion techniques represents a concerning trend that could substantially increase the volume and sophistication of Android malware campaigns targeting financial services and personal data.

Speed up and enrich threat investigations with Threat Intelligence Lookup! -> 50 trial search requests

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information

A critical vulnerability in Hikvision security cameras, first disclosed in 2017, is being actively exploited…

8 minutes ago

BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features

Critical vulnerabilities discovered in Supermicro Baseboard Management Controller (BMC) firmware have exposed a troubling pattern…

18 minutes ago

Linux Kernel ksmbd Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A severe vulnerability in the Linux kernel's ksmbd SMB server implementation has been disclosed, potentially…

51 minutes ago

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

A sophisticated cybercriminal campaign has emerged targeting Indonesian and Vietnamese Android users with banking trojans…

2 hours ago

Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts

A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening…

3 hours ago

Malicious SVGs in Phishing Campaigns: How to Detect Hidden Redirects and Payloads

Phishing campaigns are getting harder to spot, sometimes hiding in files you’d never suspect. ANY.RUN’s…

12 hours ago