Abuse Accessibility Features
A malicious app could abuse Android's accessibility features to capture sensitive data or perform other malicious actions.
Tactic Type: Post-Adversary Device Access
Tactic: Collection, Credential Access
|Application Vetting||Enterprises could perform app vetting before allowing apps to be installed on devices and search for abuse of accessibility features as part of the analysis, or otherwise use mobile app reputation services to search for known malicious apps.|
|Use Recent OS Version||Android 7.0 and higher include additional protections against this technique.|