Ekhbary
Tuesday, 03 March 2026
Breaking

New Android Malware 'Oblivion' Exploits Accessibility Service to Compromise Top Phone Security

Researchers Warn of $300 RAT Capable of Bypassing Protection

New Android Malware 'Oblivion' Exploits Accessibility Service to Compromise Top Phone Security
7DAYES
15 hours ago
114

United States - Ekhbary News Agency

New Android Malware 'Oblivion' Exploits Accessibility Service to Compromise Top Phone Security

Cybersecurity researchers have uncovered a potent new threat targeting the vast Android ecosystem: a Remote Access Trojan (RAT) named Oblivion. This sophisticated malware, capable of infecting devices running Android versions 8 through 16, is designed to exploit the built-in Accessibility Service, a feature intended to aid users with disabilities, to gain comprehensive control over a compromised device. The alarming aspect of Oblivion is its commercial accessibility; it is reportedly sold on a subscription basis, with prices starting as low as $300, making advanced mobile hacking tools affordable for a wider range of malicious actors.

Security analysts at Certo have been investigating Oblivion, noting that it is offered as a package that includes a builder tool. This builder allows buyers to customize malicious applications with their own chosen names and icons, further aiding in their disguise. Accompanying the builder is a dropper component that mimics legitimate system update prompts, a common social engineering tactic to trick users into inadvertently installing the malware. While the strategy of tricking users into sideloading apps from unofficial sources is not novel, the polished interface and demonstrated capabilities of Oblivion suggest a high degree of refinement and development effort.

The primary mechanism of Oblivion's success lies in its sophisticated abuse of Android's Accessibility Service. Typically, Android requires explicit user consent for sensitive permissions. However, Oblivion reportedly bypasses this by automating the permission approval process through this deeply integrated service. Once granted, the Accessibility Service can perform a wide array of actions on behalf of the user, but when hijacked by malware, it can grant attackers extensive privileges. This allows Oblivion to perform malicious actions without requiring the user to manually approve each step, significantly lowering the technical barrier for attackers.

Once Oblivion is active on a device, its capabilities are extensive. It can intercept and exfiltrate sensitive information, including SMS messages and two-factor authentication codes, which are critical for account security. It can also monitor push notifications, log keystrokes in real-time, and remotely manage applications by launching or deleting them. Furthermore, it can unlock the device using stolen credentials. A particularly insidious feature is its hidden remote control capability, which allows attackers to interact with the device through covert sessions while presenting a seemingly normal system interface to the user, creating a convincing overlay that masks the malicious activity.

Adding to its stealth and persistence, Oblivion incorporates anti-removal mechanisms. These features reportedly prevent users or security software from revoking permissions or uninstalling the malware. It also employs icon suppression techniques to hide its presence from the device's app drawer. The emergence of such a capable tool that can circumvent platform-level defenses raises serious concerns about the evolving security landscape for Android. Despite Google's ongoing efforts to tighten restrictions around Accessibility Service abuse, Oblivion's reported ability to bypass protections on the latest Android versions indicates that vulnerabilities persist.

Security experts advise users to remain vigilant, particularly regarding the installation of applications from outside the official Google Play Store, responding to unsolicited update notifications, and granting Accessibility permissions without fully understanding their implications. Best practices for mitigating risk include running regular security scans, employing robust endpoint protection, maintaining an active firewall, and auditing app permissions frequently. The subscription-based model of Oblivion democratizes mobile cybercrime, enabling less technically skilled individuals to deploy sophisticated attacks. Its effectiveness, rooted in social engineering amplified by automation, underscores the need for continuous user education and robust security measures from both users and device manufacturers.

Keywords: # Android malware # Oblivion RAT # Accessibility Service # mobile security # cybersecurity # Certo # social engineering # phone hacking # data theft # Android vulnerabilities