Mobile App Permissions

A free flashlight and a free QR scanner harvest your contacts, microphone, and location for six weeks - audit and fix the device.

What Is Mobile App Permissions?

Most discussions of mobile threats focus on sideloaded APKs and unknown sources - the dramatic stuff. This exercise trains you on the much more common scenario: an app from the official Play Store, with a clean record and a five-star rating, holding permissions that have nothing to do with what the app actually does. The Play Store screens for malware, not for excessive scope. Once a user accepts the install-time prompt, the app holds those permissions indefinitely until someone notices and revokes them. The simulation opens with a Tuesday morning email from the Security Operations Center. Anomaly detection has flagged ongoing data exfiltration from a work phone associated with the user's account. The culprits are not exotic - a free QR scanner used for logging paper claim receipts, and a free LED flashlight used for inspecting documents. Both came from the Play Store. Both have over a million downloads. One has been transmitting contacts, microphone audio, and location pings to a command-and-control server for six weeks; the other has been harvesting the same data and is staged for exfiltration but has not yet transmitted. From the security portal, the user reads the per-app damage report, walks the audit checklist, then picks up the phone for the actual remediation. The exercise introduces a generic permission audit view in the device's Settings app - a list of installed apps with their permission chips, color-coded by risk level, and one-tap revocation per permission. The user uninstalls the QR scanner entirely (its permission abuse has already produced exfiltration) and surgically revokes the flashlight's three excess permissions while keeping it installed (a flashlight legitimately needs Camera for the LED hardware, nothing else). The core principle the exercise teaches is the one-sentence rule: a permission is appropriate only if you can name the user-facing feature it powers in a single sentence. 'Camera so the app can read QR codes' passes; 'SMS so the app can ... read your texts?' fails immediately. The training closes with a five-question quiz covering install-time prompts, the Play Store's review limits, the right response to actively-abused permissions, why free utility apps tend to be the worst offenders, and what hygiene actually looks like on a work phone.

What You'll Learn in Mobile App Permissions

Mobile App Permissions — Training Steps

  1. A QR Scanner for Member Calls

    Wednesday afternoon. Alice is on a call with a member who is reading off a stack of paper claim receipts. The native camera app can photograph each receipt, but the company-issued claim app needs the QR code from the back of each one - and the camera cannot extract it. She needs a free QR scanner, and she needs one in the next thirty seconds.

  2. Searching for a QR Scanner

    The Play Store loads. Featured apps fill the home screen, and a big search bar sits at the top.

  3. Picking the Top Result

    Four results come back. ScanZap Pro is at the top - 4.8 stars, over a million downloads, free, no nags. Alice would have to scroll past it to even see the alternatives.

  4. Tapping Install

    The app detail page loads. Stars, downloads, screenshots, and a green Install button at the top. The publisher is RegionWave Software - not a name Alice recognizes, but with 1M+ downloads and 4.8 stars she does not look twice at the byline.

  5. Permissions a QR Scanner Doesn't Need

    Android's Package Installer slides up. Before installing, ScanZap Pro is asking Alice to grant six permissions. Two of them - Camera and Storage - make sense for a scanner. The other four make no sense at all.

  6. Tapping Install Anyway

    Alice has a member on the line and a stack of receipts to clear. She glances at the permission list, decides she will think about it later, and taps Install. The app installs in two seconds, scans her test QR perfectly, and gets the job done. The prompt is forgotten by the end of the call. This is exactly how the most common mobile threat lands in 2026: not malware that bypasses store review, but legitimate-looking apps that ask for far more than they need - and users who tap through the prompt because the task in front of them feels more urgent than the abstract risk.

  7. A Quiet Tuesday Morning

    It's 7:18 AM and Alice is in her home office with her first coffee. ScanZap Pro is still on her phone, still logging receipts every time a member calls in. A free flashlight she added a couple of weeks after the scanner is also still installed - both in good standing on the Play Store, both still doing exactly what she installed them to do. Or so it has seemed.

  8. An Email From the SOC

    Alice's laptop chimes. A new email from the Riverstone Security Operations Center sits at the top of her inbox - tagged urgent and titled in a way that ruins her morning before she has finished her coffee. The SOC has reconstructed exactly what each app on her phone has been accessing.

  9. Why Didn't the Play Store Catch This?

    Before remediating, take a moment on the question that probably feels most uncomfortable.

  10. Open the Security Portal

    Alice needs to log in and walk the audit. The SOC email links directly to the real Riverstone Security Portal.