CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Widespread NoVoice Android rootkit campaign with 2.3M downloads abuses steganography and patchable flaws

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A widespread Android malware campaign named NoVoice infected at least 2.3 million devices via 50+ Google Play apps masquerading as cleaners, galleries, and games. The malware exploited older, patched Android vulnerabilities (2016–2021) to achieve root access, including use-after-free kernel issues and Mali GPU driver flaws, before disabling SELinux and replacing system libraries with rootkits. Post-exploitation, the attackers injected code into running apps, primarily targeting WhatsApp to extract encryption databases, Signal protocol keys, and account identifiers for session hijacking. Persistence mechanisms ensure survival across factory resets, and the campaign avoided specific Chinese regions while evading detection via emulator, debugger, and VPN checks.

Timeline

  1. 01.04.2026 21:07 1 articles · 1h ago

    NoVoice Android rootkit campaign with WhatsApp session hijacking hits 2.3 million devices via Google Play

    A rootkit-based Android malware campaign named NoVoice infected over 2.3 million devices through 50+ Google Play apps, including cleaners, galleries, and games. The malware exploited patched Android vulnerabilities (2016–2021) to gain root access, disable SELinux, and replace system libraries with rootkits that persist across factory resets. Initial payloads were concealed via PNG steganography and injected into running apps, primarily targeting WhatsApp to extract encryption databases, Signal protocol keys, and account identifiers for session cloning. Malicious apps were removed from Google Play after reporting by McAfee, but users with active infections should assume device and data compromise.

    Show sources

Information Snippets