{"id":49727,"date":"2025-04-25T15:39:09","date_gmt":"2025-04-25T15:39:09","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/49727\/"},"modified":"2025-04-25T15:39:09","modified_gmt":"2025-04-25T15:39:09","slug":"how-android-16s-new-security-mode-will-stop-usb-based-attacks","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/49727\/","title":{"rendered":"How Android 16&#8217;s new security mode will stop USB-based attacks"},"content":{"rendered":"<p><img class=\"e_jg\" decoding=\"async\" loading=\"eager\"  title=\"USB stick plugged into an Android phone while locked hero image\"  alt=\"USB stick plugged into an Android phone while locked hero image\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/04\/USB_stick_plugged_into_an_Android_phone_while_locked_hero_image-scaled.jpg\"\/><\/p>\n<p>Mishaal Rahman \/ Android Authority<\/p>\n<p>TL;DR<\/p>\n<ul>\n<li>Google is adding an optional Android 16 feature to disable USB data access when the phone is locked for enhanced security.<\/li>\n<li>This protects against attackers from using USB devices to extract data or bypass the lock screen on lost or confiscated phones.<\/li>\n<li>Tied to the new Advanced Protection Mode, it blocks new USB peripherals until the device is unlocked and the USB is reinserted.<\/li>\n<\/ul>\n<p>If you\u2019re serious about security, then you probably already avoid inserting random USB sticks into your personal devices. It\u2019s good practice to be cautious of unknown USB devices, especially since you don\u2019t know what kinds of payloads they might contain. But if your Android device is lost or confiscated, then you can\u2019t stop someone else from inserting a USB device. To protect against this, Google is working on a new, optional feature in <a href=\"https:\/\/www.androidauthority.com\/android-16-features-3484159\/\" target=\"_blank\" rel=\"noopener\">Android 16<\/a> that disables USB access when your phone is locked.<\/p>\n<p>\nYou\u2019re reading an <strong>Authority Insights<\/strong> story. Discover <a href=\"https:\/\/www.androidauthority.com\/tag\/authority-insights\/\" target=\"_blank\" rel=\"noopener\">Authority Insights<\/a> for more exclusive reports, app teardowns, leaks, and in-depth tech coverage you won\u2019t find anywhere else.<\/p>\n<p>It might sound like paranoia, but there are valid reasons why one might want to block USB devices when your Android phone is locked. If you\u2019re a journalist or activist who is at risk of being targeted by hackers, you\u2019ll want to take every precaution you can to prevent your phone\u2019s contents from being extracted. USB peripherals like keyboards can be used to brute force the keyguard, while other devices can inject payloads that exploit vulnerabilities to unlock the device. This isn\u2019t hypothetical \u2014 Amnesty International\u2019s Security Lab recently <a href=\"https:\/\/securitylab.amnesty.org\/latest\/2025\/02\/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist\/\" target=\"_blank\" rel=\"noopener\">documented<\/a> a zero-day USB driver exploit that was used to break into the phone of a student activist in Serbia.<\/p>\n<p>The best way to stop these kinds of attacks is to disable USB data signaling, preventing USB devices from sending data to locked Android devices. This can be achieved in two ways: through hardware or software controls. Disabling USB data signaling at the hardware level cuts off the USB data lines entirely. Charging will still work, of course, but all peripherals\u2014including keyboards, mice, flash drives, and even external displays\u2014will not.<\/p>\n<p>According to the <a href=\"https:\/\/www.androidauthority.com\/grapheneos-3287030\/\" target=\"_blank\" rel=\"noopener\">GrapheneOS<\/a> team, implementing this hardware-level feature requires changes to USB drivers. In contrast, the software-level approach involves disabling high-level USB support, essentially blocking connections from new peripherals and gadgets when the device is locked. While either method would have thwarted the exploit documented by Amnesty International, the hardware-based approach offers slightly stronger security.<\/p>\n<p>With the release of Android 12 in 2021, Google introduced an API for disabling USB data signaling at a software level. This API was made available to device admin apps, i.e. apps that manage enterprise devices. It wasn\u2019t used in any other context until the release of <a href=\"https:\/\/www.androidauthority.com\/android-15-features-3401939\/\" target=\"_blank\" rel=\"noopener\">Android 15<\/a> last year, which enhanced the operating system\u2019s <a href=\"https:\/\/www.androidauthority.com\/android-15-lockdown-mode-changes-3450855\/\" target=\"_blank\" rel=\"noopener\">lockdown mode<\/a> to also disable USB data access. Now in Android 16, Google is looking to use this API to disable USB data access when your Android device is locked, but only if you enable Advanced Protection Mode.<\/p>\n<p><a href=\"https:\/\/www.androidauthority.com\/android-16-advanced-protection-mode-3518368\/\" target=\"_blank\" rel=\"noopener\">Advanced Protection Mode<\/a> is a new feature in Android 16 that enables extra security features for people who opt in. It builds upon Google\u2019s Advanced Protection Program, a security program that provides extra protection against hackers getting into your Google account. When Advanced Protection Mode is enabled in Android 16, apps can\u2019t be granted the sideloading permission, 2G access can\u2019t be enabled, MTE is enabled for compatible apps, and WEP connections are blocked. In addition, apps can query the Advanced Protection Mode API to know when a user has opted in and then enable their own set of security features. As <a href=\"https:\/\/www.androidauthority.com\/android-16-advanced-protection-mode-security-features-apk-teardown-3545203\/\" target=\"_blank\" rel=\"noopener\">revealed in an APK teardown<\/a>, apps like Phone by Google and Messages are poised to support Advanced Protection Mode.<\/p>\n<p><img class=\"e_jg\" decoding=\"async\" loading=\"lazy\"  title=\"Sideloading disabled by advanced protection in Android 16 Beta 1\"  alt=\"Sideloading disabled by advanced protection in Android 16 Beta 1\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/04\/Sideloading_disabled_by_advanced_protection_in_Android_16_Beta_1.jpg\"\/><img class=\"e_jg\" decoding=\"async\" loading=\"lazy\"  title=\"Advanced protection dialog in Android 16 Beta 1\"  alt=\"Advanced protection dialog in Android 16 Beta 1\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/04\/Advanced_protection_dialog_in_Android_16_Beta_1.jpg\"\/><\/p>\n<p>While digging through the recent Android 16 betas, I found strings that suggest enabling Advanced Protection Mode will also disable USB data signaling when Android is locked. The titles of each string have \u201c_apm_\u201d in them, which stands for Advanced Protection Mode internally. They also explicitly mention how new USB devices can\u2019t be used when Android is locked. When a new USB device is plugged in, a notification will appear that warns the user of \u201csuspicious USB activity.\u201d To use the device, you have to \u201cunlock Android first and then reinsert [the] USB device to use it.\u201d<\/p>\n<p>Code<\/p>\n<p>Copy TextUSB device is plugged in when Android is locked.&#13;<br \/>\nTo use device, please unlock Android first and then reinsert USB device to use it.&#13;<br \/>\nUSB device plugged in when locked&#13;<br \/>\nUSB data signal has been disabled.&#13;<br \/>\nSuspicious USB activity<\/p>\n<p>Google has yet to roll out a user-facing way to enable Advanced Protection Mode, but I was able to manually enable it in <a href=\"https:\/\/www.androidauthority.com\/android-16-beta-4-3545798\/\" target=\"_blank\" rel=\"noopener\">Android 16 Beta 4<\/a>. After enabling it, I was able to get the new USB data protection working, as shown in the video embedded below.<\/p>\n<p>As you can see in the video, Android rejects both the USB stick and the keyboard I inserted into my Pixel device when it was locked. Only after unlocking and reinserting both items was I able to use them. After inserting them and then locking the device, they weren\u2019t disconnected\u2014suggesting that Android won\u2019t forcibly disconnect USB devices with an active data connection.<\/p>\n<p><img class=\"e_jg\" decoding=\"async\" loading=\"lazy\"  title=\"USB device plugged in while locked notification\"  alt=\"USB device plugged in while locked notification\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/04\/USB_device_plugged_in_while_locked_notification.jpg\"\/><\/p>\n<p>Mishaal Rahman \/ Android Authority<\/p>\n<p>This is a simple security change that should prevent cases like the one described in the Amnesty International report from happening again. Hopefully Google rolls out a way to toggle Android 16\u2019s new Advanced Protection Mode soon, because it\u2019ll serve as an easy one-click toggle to enable a lot of features that security-conscious users will enjoy.<\/p>\n<p><strong>Got a tip? Talk to us!<\/strong> Email our staff at <a class=\"c-link\" href=\"https:\/\/www.androidauthority.com\/android-16-usb-data-advanced-protection-3548018\/mailto:news@androidauthority.com\" rel=\"noopener noreferrer\" data-stringify-link=\"mailto:tips@androidauthority.com\" data-sk=\"tooltip_parent\" aria-haspopup=\"menu\" target=\"_blank\">news@androidauthority.com<\/a>. You can stay anonymous or get credit for the info, it&#8217;s your choice.<\/p>\n","protected":false},"excerpt":{"rendered":"Mishaal Rahman \/ Android Authority TL;DR Google is adding an optional Android 16 feature to disable USB data&hellip;\n","protected":false},"author":2,"featured_media":49728,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3159],"tags":[2239,2240,547,53,16,15],"class_list":{"0":"post-49727","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-android-16","9":"tag-authority-insights","10":"tag-mobile","11":"tag-technology","12":"tag-uk","13":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114399357424907194","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/49727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=49727"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/49727\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/49728"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=49727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=49727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=49727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}