Screenshot protection
Banking malware, such as trojans that abuse accessibility services, and remote access tools use screen capture and video recording techniques to obtain sensitive information displayed in the app interface, including credentials, balances, and temporary authentication codes. This type of attack exploits the visual exposure of data, even when other security mechanisms are present.
To mitigate this risk, MAD applies a protection mechanism provided by the operating system itself, preventing sensitive screens of the application from being copied, recorded, or displayed in unauthorized contexts. This protection blocks attempts at screenshots, screen recording, and the exposure of content in previews and recent apps lists, significantly reducing the risk of confidential information leakage.
Technical Mechanism: MAD programmatically applies the operating system security flag to the application's window, ensuring that sensitive content cannot be captured by other apps or by the system itself. As a result, any attempt to record or capture the screen results in the hiding of the protected content, and the thumbnails shown in the recent apps screen do not display sensitive information, protecting data against improper viewing or accidental exposure.
<screenProtection>
<enabled>true</enabled>
</screenProtection>Last updated