Close Menu
geekfence.comgeekfence.com
    What's Hot

    The Devil Wears Prada 2 Streaming, VOD, DVD And Blu-ray Release Date

    April 30, 2026

    AI Code Review Only Catches Half of Your Bugs – O’Reilly

    April 30, 2026

    Belden to acquire RUCKUS Networks for $1.85bn

    April 30, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»UK Tech News»Android Malware Infects Over 2.3 Million Devices – Is Yours One?
    UK Tech News

    Android Malware Infects Over 2.3 Million Devices – Is Yours One?

    AdminBy AdminApril 3, 2026No Comments4 Mins Read5 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Android Malware Infects Over 2.3 Million Devices – Is Yours One?
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Summary created by Smart Answers AI

    In summary:

    • Tech Advisor reports that sophisticated Android malware has infected over 2.3 million devices by exploiting 22 vulnerabilities from 2016-2021 to gain root access.
    • The malware survives factory resets on older unpatched devices and injects code into apps like WhatsApp while gathering device data for targeted attacks.
    • Users should immediately install Android security updates from May 2021 or newer, only download apps from Google Play Store, and consider replacing outdated devices for protection.

    Security experts at McAfee have discovered a new piece of Android malware called NoVoice on Google Play. The malware was hidden within over 50 different Android apps and has been downloaded at least 2.3 million times.

    How the malware disguises itself

    The apps in which NoVoice was hidden disguise themselves as cleaners, photo galleries or games, as reported by the US IT security news portal BleepingComputer. The apps don’t request any particularly suspicious permissions during installation, making them inconspicuous, especially as they deliver the promised functionality.

    Full control over infected Android devices

    Once the infected app is launched, the malware attempts to gain root access on the Android device by exploiting old Android security vulnerabilities for which patches were released between 2016 and 2021. The malware then contacts the command-and-control server (C2) and sends it data about the infected Android device – hardware, kernel, Android version, installed apps and root status – in order to determine the correct attack strategy.

    The malware then downloads further components to enable a targeted attack on the affected Android device. The attacker exploits 22 different vulnerabilities to bypass the Android device’s security mechanisms and ultimately gain root privileges.

    After rooting the device, important system libraries such as libandroid_runtime.so and libmedia_jni.so are replaced by manipulated wrappers that intercept system calls and redirect execution to the attack code, as BleepingComputer reports.

    It survives even a reset

    The malware could even survive a device reset, as McAfee explains: “In some cases, the infection can survive a normal factory reset, as the malicious components modify parts of the system software that are not usually replaced during such a reset.” It injects code controlled by attackers into every app launched on the device. WhatsApp is said to be a primary target.

    Security experts have not yet been able to identify who’s behind the malware. However, the researchers highlight similarities to the Android Trojan Triada, which has already been responsible for infections on several occasions.

    The best protection: install all security updates

    Google has now removed the infected apps from Google Play. However, if you’ve already installed the apps, your device remains infected.

    There is, however, a good safeguard: as NoVoice targets security vulnerabilities that were patched by May 2021, this threat in its current form is effectively mitigated by upgrading to a device with a newer security patch. You should therefore ensure you update your Android device to the latest software version or replace it if you can’t.

    We’d advise replacing any phone that hasn’t been protected by security updates for that long, and we have recommendations for the best phones and best budget phones we’ve tested.

    McAfee adds: “To completely remove the infection, the device’s firmware may need to be reinstalled, which is not something most users can easily do themselves”.

    These Android devices are safe

    Android devices running a current version of Android with all available security updates installed should therefore be safe. McAfee writes: “On older or unpatched Android devices, the malware can install an extremely persistent infection that may even survive a standard factory reset. Although newer Android devices with up-to-date security measures are not vulnerable to the root exploit observed in this campaign, they may still be exposed to other types of malicious activity via these apps.”

    You can read McAfee‘s detailed analysis to find out more.

    How to protect yourself

    Only install apps from Google Play, and never from other app stores (although that wouldn’t have helped in this case). Enable Google Play Protect and install a virus scanner.

    Before downloading any app, check its permissions, the number of downloads, and read the reviews on Google Play. Always install all Android security updates as soon as they’re available.

    More on Android:

    This article originally appeared on our sister publication PC-WELT and was translated and adapted from German.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    The Devil Wears Prada 2 Streaming, VOD, DVD And Blu-ray Release Date

    April 30, 2026

    Duck Creek is entering its operating model era

    April 29, 2026

    Guinness Enterprise Centre start-ups generated €140M revenues last year

    April 28, 2026

    OpenAI plans its own ‘iPhone killer’ – Computerworld

    April 27, 2026

    Oppo Pad mini: Hands-on Impressions

    April 26, 2026

    Offshore CX enters a new era of scrutiny: why enterprises must rethink delivery models

    April 25, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202533 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202626 Views

    Redefining AI efficiency with extreme compression

    March 25, 202625 Views
    Don't Miss

    The Devil Wears Prada 2 Streaming, VOD, DVD And Blu-ray Release Date

    April 30, 2026

    Summary created by Smart Answers AIIn summary:Tech Advisor reports that The Devil Wears Prada 2…

    AI Code Review Only Catches Half of Your Bugs – O’Reilly

    April 30, 2026

    Belden to acquire RUCKUS Networks for $1.85bn

    April 30, 2026

    Is Refusing to Adopt AI Tools at Work Damaging Your Career Growth?

    April 30, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    The Devil Wears Prada 2 Streaming, VOD, DVD And Blu-ray Release Date

    April 30, 2026

    AI Code Review Only Catches Half of Your Bugs – O’Reilly

    April 30, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.