Close Menu
geekfence.comgeekfence.com
    What's Hot

    Android Malware Infects Over 2.3 Million Devices – Is Yours One?

    April 3, 2026

    Threat actor abuse of AI accelerates from tool to cyberattack surface

    April 3, 2026

    Some startups and researchers who can’t access the most advanced chips are adopting a “frugal AI” approach, building smaller models on open-weight systems (Rina Chandran/Rest of World)

    April 3, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»UK Tech News»Android Malware Infects Over 2.3 Million Devices – Is Yours One?
    UK Tech News

    Android Malware Infects Over 2.3 Million Devices – Is Yours One?

    AdminBy AdminApril 3, 2026No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Android Malware Infects Over 2.3 Million Devices – Is Yours One?
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Summary created by Smart Answers AI

    In summary:

    • Tech Advisor reports that sophisticated Android malware has infected over 2.3 million devices by exploiting 22 vulnerabilities from 2016-2021 to gain root access.
    • The malware survives factory resets on older unpatched devices and injects code into apps like WhatsApp while gathering device data for targeted attacks.
    • Users should immediately install Android security updates from May 2021 or newer, only download apps from Google Play Store, and consider replacing outdated devices for protection.

    Security experts at McAfee have discovered a new piece of Android malware called NoVoice on Google Play. The malware was hidden within over 50 different Android apps and has been downloaded at least 2.3 million times.

    How the malware disguises itself

    The apps in which NoVoice was hidden disguise themselves as cleaners, photo galleries or games, as reported by the US IT security news portal BleepingComputer. The apps don’t request any particularly suspicious permissions during installation, making them inconspicuous, especially as they deliver the promised functionality.

    Full control over infected Android devices

    Once the infected app is launched, the malware attempts to gain root access on the Android device by exploiting old Android security vulnerabilities for which patches were released between 2016 and 2021. The malware then contacts the command-and-control server (C2) and sends it data about the infected Android device – hardware, kernel, Android version, installed apps and root status – in order to determine the correct attack strategy.

    The malware then downloads further components to enable a targeted attack on the affected Android device. The attacker exploits 22 different vulnerabilities to bypass the Android device’s security mechanisms and ultimately gain root privileges.

    After rooting the device, important system libraries such as libandroid_runtime.so and libmedia_jni.so are replaced by manipulated wrappers that intercept system calls and redirect execution to the attack code, as BleepingComputer reports.

    It survives even a reset

    The malware could even survive a device reset, as McAfee explains: “In some cases, the infection can survive a normal factory reset, as the malicious components modify parts of the system software that are not usually replaced during such a reset.” It injects code controlled by attackers into every app launched on the device. WhatsApp is said to be a primary target.

    Security experts have not yet been able to identify who’s behind the malware. However, the researchers highlight similarities to the Android Trojan Triada, which has already been responsible for infections on several occasions.

    The best protection: install all security updates

    Google has now removed the infected apps from Google Play. However, if you’ve already installed the apps, your device remains infected.

    There is, however, a good safeguard: as NoVoice targets security vulnerabilities that were patched by May 2021, this threat in its current form is effectively mitigated by upgrading to a device with a newer security patch. You should therefore ensure you update your Android device to the latest software version or replace it if you can’t.

    We’d advise replacing any phone that hasn’t been protected by security updates for that long, and we have recommendations for the best phones and best budget phones we’ve tested.

    McAfee adds: “To completely remove the infection, the device’s firmware may need to be reinstalled, which is not something most users can easily do themselves”.

    These Android devices are safe

    Android devices running a current version of Android with all available security updates installed should therefore be safe. McAfee writes: “On older or unpatched Android devices, the malware can install an extremely persistent infection that may even survive a standard factory reset. Although newer Android devices with up-to-date security measures are not vulnerable to the root exploit observed in this campaign, they may still be exposed to other types of malicious activity via these apps.”

    You can read McAfee‘s detailed analysis to find out more.

    How to protect yourself

    Only install apps from Google Play, and never from other app stores (although that wouldn’t have helped in this case). Enable Google Play Protect and install a virus scanner.

    Before downloading any app, check its permissions, the number of downloads, and read the reviews on Google Play. Always install all Android security updates as soon as they’re available.

    More on Android:

    This article originally appeared on our sister publication PC-WELT and was translated and adapted from German.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    MCP is not another AdTech buzzword – it’s the workflow layer AI has been missing 

    April 2, 2026

    Esri powers increased public safety for Northern Ireland Electricity Networks

    April 1, 2026

    Beware of headlines touting impossible AI benefits, analysts warn

    March 31, 2026

    Best Kids’ Headphones: Protect Your Child’s Hearing

    March 30, 2026

    From resumes to results: Findem bets on verified hiring with Glider AI 

    March 29, 2026

    refurbed and GoPro announce exclusive partnership in Ireland

    March 28, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202527 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    Redefining AI efficiency with extreme compression

    March 25, 202622 Views
    Don't Miss

    Android Malware Infects Over 2.3 Million Devices – Is Yours One?

    April 3, 2026

    Summary created by Smart Answers AIIn summary:Tech Advisor reports that sophisticated Android malware has infected…

    Threat actor abuse of AI accelerates from tool to cyberattack surface

    April 3, 2026

    Some startups and researchers who can’t access the most advanced chips are adopting a “frugal AI” approach, building smaller models on open-weight systems (Rina Chandran/Rest of World)

    April 3, 2026

    Announcing managed daemon support for Amazon ECS Managed Instances

    April 3, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Android Malware Infects Over 2.3 Million Devices – Is Yours One?

    April 3, 2026

    Threat actor abuse of AI accelerates from tool to cyberattack surface

    April 3, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.