Unauthorized Transfers
Direct financial loss from hijacked confirmations.
Threat Intelligence
Affected: Mobile Banking · Payments · Crypto Wallets
Overlay malware draws invisible or deceptive layers over banking UI, tricking users into authorizing transfers or revealing credentials while believing they interact with the legitimate app.
Low
Attack Complexity
SYSTEM_ALERT_WINDOW
9.0/10
Exploitability
Banking trojan kits
Critical
Fraud Risk
Direct fund loss
High
Regulatory Impact
Fraud control exams
Attack chain
Typical exploitation path in mobile banking
Kill Chain
End-to-end attack timeline observed in mobile banking incidents.
Trojan sideloaded or delivered via phishing.
SYSTEM_ALERT_WINDOW or accessibility abuse granted.
User opens legitimate banking app.
Invisible layer intercepts taps on Confirm / Pay.
Malware confirms attacker-controlled transaction.
Business Impact
Operational, financial and regulatory consequences for BFSI.
Direct financial loss from hijacked confirmations.
Fake login overlays capture PIN/password.
Fraud control deficiencies in examinations.
Customers blame bank for malware losses.
Automated transfer systems scale attacks.
SOC Intelligence
Typical APK assessment findings mapped to this threat.
Screenshots and overlays possible.
Cannot detect SYSTEM_ALERT_WINDOW abuse.
a11y service can automate taps.
Cannot distinguish synthetic taps.
Detection
Four-phase governance pipeline — deterministic evidence only.
Phase 1
Phase 2
Phase 3
Phase 4
Mitigation
Layered defenses with coverage, effort and effectiveness ratings.
Protects: Screenshot + some overlay classes
Effort
Low
Effectiveness
75%
Apply on auth, OTP, payment and confirmation screens.
Protects: Active overlay windows
Effort
High
Effectiveness
90%
Promon / Approov — banking standard for Android.
Protects: ATS automation
Effort
Medium
Effectiveness
80%
Do not blanket-block a11y — use fraud analytics.
Protects: Out-of-band confirmation
Effort
High
Effectiveness
92%
Hardware token or push signing defeats UI-only overlays.
Regulatory Intel
Compliance confidence and mapped control counts per jurisdiction.
CBUAE
12 mapped controls
View mandate →RBI
9 mapped controls
View mandate →MAS
11 mapped controls
View mandate →EBA / PSD2
10 mapped controls
View mandate →FFIEC
8 mapped controls
View mandate →Framework Alignment
How this threat maps across MASVS, OWASP Mobile, PCI DSS, PSD2, NIST and DORA.
| Control | MASVS | OWASP Mobile | PCI DSS | PSD2 | NIST | DORA |
|---|---|---|---|---|---|---|
| Overlay prevention | ● | ◐ | ○ | ◐ | ◐ | ◐ |
| Screen protection | ● | ◐ | ○ | ○ | ● | ● |
| Fraud controls | ◐ | ◐ | ◐ | ● | ● | ● |
Executive Summary
Board-ready risk dimensions and impact heatmap.
Lower = higher residual risk
Impact heatmap
Fraud
L: 92%
I: 98%
ATS
L: 88%
I: 95%
Credential theft
L: 80%
I: 85%
Vendor Intel
RASP, attestation and device-trust solutions for banking programs.
Best for banking RASP
Enterprise
Banking: excellent
Pros
Limitations
Strong API integrity
Enterprise
Banking: excellent
Pros
Limitations
Mobile threat defense
Enterprise
Banking: good
Pros
Limitations
No-code runtime protection
Mid-market
Banking: good
Pros
Limitations
Baseline device trust
Platform / Free
Banking: baseline
Pros
Limitations
APK Preview
Sample assessment output for Overlay Attacks exposure.
Risk score
31
/ 100
2 critical findings
Observed risks
Mapped controls
Related Intel
Adjacent attack patterns
Governance standards
FAQ
SEO-optimized answers for security and governance teams.
Malware requests SYSTEM_ALERT_WINDOW and draws layers over banking UI, intercepting taps on Confirm/Pay buttons.
It blocks screenshots and some capture vectors but must be combined with active overlay detection for comprehensive protection.
Automated Transfer System fraud uses accessibility and overlays to authorize transfers without user awareness.
Take action
Upload your Android banking app for evidence-backed threat intelligence — no hallucinated findings.