How to set up anti-phishing security in Kaspersky for Android | Kaspersky official blog
We show you how to set up all three layers of the updated anti-phishing protection in Kaspersky for Android.
AI Analysis
Technical Summary
Phishing attacks on Android devices have become increasingly sophisticated, exploiting messaging apps, SMS, and notifications to deliver malicious links that lead to credential theft, account hijacking, or device compromise. Kaspersky for Android has introduced a new anti-phishing security layer called Notification Protection, which scans notifications from any app for phishing links and blocks them by replacing the notification with a warning. This complements the existing Safe Messaging layer that blocks dangerous links in SMS and popular messaging apps like WhatsApp, Viber, and Telegram, as well as the Safe Browsing layer that prevents access to malicious websites in browsers such as Google Chrome, Firefox, Samsung Internet, and Huawei Browser. The Notification Protection layer requires users to grant accessibility and notification access permissions, enabling the app to scan notification text for standard URLs. It does not read private messages or detect links hidden by special formatting or anchor text. The solution addresses the growing threat of phishing links delivered via hijacked accounts or zero-click attacks, where simply visiting a malicious URL can compromise a device. The update also advises Telegram users to disable the in-app browser to ensure links are opened in external browsers where Safe Browsing can function effectively. This multi-layered approach creates a robust defense against phishing by intercepting malicious links at multiple points of user interaction on Android devices. The update is available to all Kaspersky Standard, Plus, and Premium subscribers and aims to reduce the risk of phishing-related compromises in mobile environments.
Potential Impact
For European organizations, the threat of phishing on Android devices poses significant risks including credential theft, unauthorized access to corporate resources, and potential lateral movement within networks if mobile devices are used for corporate communications or access. The rise of zero-click attacks increases the risk of compromise without user interaction, potentially leading to data breaches or ransomware infections. Organizations with employees using messaging apps like WhatsApp, Telegram, and Viber are particularly vulnerable due to the prevalence of phishing links in these platforms. The enhanced Kaspersky anti-phishing features help mitigate these risks by providing real-time detection and blocking of malicious links across notifications, messages, and browsers. This reduces the likelihood of successful phishing attacks that could lead to account hijacking or device compromise. However, the effectiveness depends on proper configuration and user adherence to security recommendations. Failure to enable all layers or adjust app settings (e.g., Telegram’s in-app browser) may leave gaps in protection. Overall, this threat and its mitigation are critical for maintaining mobile security hygiene and protecting sensitive corporate and personal data within European enterprises.
Mitigation Recommendations
1. Ensure all Kaspersky for Android anti-phishing layers are enabled: Notification Protection, Safe Messaging, and Safe Browsing. 2. Grant necessary Android permissions including Accessibility and Notification Access to allow comprehensive scanning of notifications and messages. 3. Configure messaging apps, especially Telegram, to open links in external browsers rather than in-app browsers to enable Safe Browsing protections. 4. Educate users on recognizing phishing attempts and the importance of not clicking on suspicious links, even from known contacts. 5. Regularly update Kaspersky for Android to benefit from the latest threat intelligence and security features. 6. Monitor and audit mobile device security policies to ensure compliance with recommended settings. 7. Integrate mobile anti-phishing controls with broader enterprise mobile device management (MDM) solutions for centralized oversight. 8. Encourage use of multi-factor authentication (MFA) on all accounts accessed via mobile devices to limit impact of credential theft. 9. Conduct phishing simulation exercises tailored to mobile phishing scenarios to raise user awareness. 10. Maintain up-to-date incident response plans that include mobile phishing attack vectors.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
How to set up anti-phishing security in Kaspersky for Android | Kaspersky official blog
Description
We show you how to set up all three layers of the updated anti-phishing protection in Kaspersky for Android.
AI-Powered Analysis
Technical Analysis
Phishing attacks on Android devices have become increasingly sophisticated, exploiting messaging apps, SMS, and notifications to deliver malicious links that lead to credential theft, account hijacking, or device compromise. Kaspersky for Android has introduced a new anti-phishing security layer called Notification Protection, which scans notifications from any app for phishing links and blocks them by replacing the notification with a warning. This complements the existing Safe Messaging layer that blocks dangerous links in SMS and popular messaging apps like WhatsApp, Viber, and Telegram, as well as the Safe Browsing layer that prevents access to malicious websites in browsers such as Google Chrome, Firefox, Samsung Internet, and Huawei Browser. The Notification Protection layer requires users to grant accessibility and notification access permissions, enabling the app to scan notification text for standard URLs. It does not read private messages or detect links hidden by special formatting or anchor text. The solution addresses the growing threat of phishing links delivered via hijacked accounts or zero-click attacks, where simply visiting a malicious URL can compromise a device. The update also advises Telegram users to disable the in-app browser to ensure links are opened in external browsers where Safe Browsing can function effectively. This multi-layered approach creates a robust defense against phishing by intercepting malicious links at multiple points of user interaction on Android devices. The update is available to all Kaspersky Standard, Plus, and Premium subscribers and aims to reduce the risk of phishing-related compromises in mobile environments.
Potential Impact
For European organizations, the threat of phishing on Android devices poses significant risks including credential theft, unauthorized access to corporate resources, and potential lateral movement within networks if mobile devices are used for corporate communications or access. The rise of zero-click attacks increases the risk of compromise without user interaction, potentially leading to data breaches or ransomware infections. Organizations with employees using messaging apps like WhatsApp, Telegram, and Viber are particularly vulnerable due to the prevalence of phishing links in these platforms. The enhanced Kaspersky anti-phishing features help mitigate these risks by providing real-time detection and blocking of malicious links across notifications, messages, and browsers. This reduces the likelihood of successful phishing attacks that could lead to account hijacking or device compromise. However, the effectiveness depends on proper configuration and user adherence to security recommendations. Failure to enable all layers or adjust app settings (e.g., Telegram’s in-app browser) may leave gaps in protection. Overall, this threat and its mitigation are critical for maintaining mobile security hygiene and protecting sensitive corporate and personal data within European enterprises.
Mitigation Recommendations
1. Ensure all Kaspersky for Android anti-phishing layers are enabled: Notification Protection, Safe Messaging, and Safe Browsing. 2. Grant necessary Android permissions including Accessibility and Notification Access to allow comprehensive scanning of notifications and messages. 3. Configure messaging apps, especially Telegram, to open links in external browsers rather than in-app browsers to enable Safe Browsing protections. 4. Educate users on recognizing phishing attempts and the importance of not clicking on suspicious links, even from known contacts. 5. Regularly update Kaspersky for Android to benefit from the latest threat intelligence and security features. 6. Monitor and audit mobile device security policies to ensure compliance with recommended settings. 7. Integrate mobile anti-phishing controls with broader enterprise mobile device management (MDM) solutions for centralized oversight. 8. Encourage use of multi-factor authentication (MFA) on all accounts accessed via mobile devices to limit impact of credential theft. 9. Conduct phishing simulation exercises tailored to mobile phishing scenarios to raise user awareness. 10. Maintain up-to-date incident response plans that include mobile phishing attack vectors.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/notification-listener-in-kaspersky-for-android/54466/","fetched":true,"fetchedAt":"2025-10-07T01:33:07.446Z","wordCount":1882}
Threat ID: 68e46dd46a45552f36e95753
Added to database: 10/7/2025, 1:33:08 AM
Last enriched: 10/7/2025, 1:34:07 AM
Last updated: 10/7/2025, 12:02:27 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
How scammers have mastered AI: deepfakes, fake websites, and phishing emails | Kaspersky official blog
MediumHow to protect yourself from "voting" phishing scams, and avoid losing your WhatsApp account | Kaspersky official blog
MediumIn Other News: PQC Adoption, New Android Spyware, FEMA Data Breach
MediumUkrainian Cops Spoofed in Fileless Phishing Attacks on Kyiv
MediumAndroid Spyware in the UAE Masquerades as ... Spyware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.