Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft

April 17, 2026

CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks

April 17, 2026

Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links

April 17, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Silent Invasion: Malware Targets Android Devices Through Supply Chain Attacks
Compliance

Silent Invasion: Malware Targets Android Devices Through Supply Chain Attacks

Staff WriterBy Staff WriterFebruary 17, 2026No Comments3 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Quick Takeaways

  1. New Malware Threat: Researchers have identified “Keenadu,” a malware embedded in the firmware of various Android devices, allowing attackers unrestricted remote access to all apps.

  2. Supply Chain Compromise: The malware originated from a supply chain attack where malicious code was integrated during firmware development, affecting multiple small device manufacturers.

  3. Ad Fraud Operations: Currently, Keenadu enables ad fraud by simulating clicks on advertisements, but it can also take full control of compromised devices, posing significant security risks.

  4. Connections to Major Botnets: Keenadu is linked to other major Android botnets (BADBOX, Triada, Vo1d), indicating a coordinated effort among various malware operations, further complicating the cybersecurity landscape.

A Firmware Level Threat

Researchers recently identified a concerning piece of malware embedded in the firmware of various Android devices. Kaspersky, a leading cybersecurity firm, named this malware “Keenadu.” It injects itself into every application on affected systems. Consequently, this gives attackers near-unrestricted remote access to user data. Kaspersky discovered Keenadu while investigating similar firmware-level threats.

The malware originates from a compromised stage in the firmware supply chain. As a result, it integrates itself into the code before the device even reaches the market. Thus, many manufacturers may have been unaware of the risks posed by their devices. As of February, approximately 13,000 Android devices have fallen victim to Keenadu. Most affected users reside in Russia, with others in countries like Japan and Germany. Some users received devices already infected with the malware, while others encountered it through standard over-the-air updates.

Keenadu poses additional dangers through its stealthy distribution methods. Attackers can hide the malware within system apps, including common services like facial recognition tools. Furthermore, it can penetrate modified versions of popular applications available on official platforms. The malware operates as a multi-stage loader, which can hijack browser searches and commit advertising fraud, among other actions. Users may find their devices executing tasks without their knowledge.

Connected to Other Major Android Botnets?

Worryingly, Kaspersky’s investigation linked Keenadu to several other notorious Android botnets, such as BADBOX and Triada. This connection hints at a coordinated effort among some of the largest mobile malware operations. Evidence shows instances where BADBOX deployed Keenadu payloads, emphasizing a growing network of cyber threats.

Kaspersky has stepped forward to help users identify if their devices are infected. If a device came with Keenadu preloaded, replacing the firmware is the only solution. For other cases, users should seek clean replacements for any infected applications or disable them entirely. Users who unknowingly downloaded malicious apps from third-party sources should uninstall them.

The growing prevalence of such threats underscores the necessity for robust security measures. As technology evolves, so do the tactics of cybercriminals, reminding users to remain vigilant in protecting their devices and personal information.

Discover More Technology Insights

Dive deeper into the world of Cryptocurrency and its impact on global finance.

Discover archived knowledge and digital history on the Internet Archive.

CyberRisk-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePolish Authorities Capture Alleged Phobos Ransomware Collaborator
Next Article Torq Hires Ex-Virgin Atlantic CISO to Lead AI-Driven Security Operations
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

North Korea Hacks macOS Users’ Data with ClickFix

April 16, 2026

Critical MCP Flaw Threatens NGINX Security

April 15, 2026

Privilege Elevation Takes Center Stage in Massive Microsoft Patch Update

April 14, 2026

Comments are closed.

Latest Posts

Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft

April 17, 2026

CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks

April 17, 2026

Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links

April 17, 2026

Emerson Integrates OPSWAT to Elevate OT Patch Management in Ovation Platform

April 17, 2026
Don't Miss

North Korea Hacks macOS Users’ Data with ClickFix

By Staff WriterApril 16, 2026

Essential Insights North Korean threat actors, specifically Sapphire Sleet, are using a macOS-specific ClickFix campaign…

Critical MCP Flaw Threatens NGINX Security

April 15, 2026

Privilege Elevation Takes Center Stage in Massive Microsoft Patch Update

April 14, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft
  • CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks
  • Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links
  • Emerson Integrates OPSWAT to Elevate OT Patch Management in Ovation Platform
  • EU’s New Age Verification App Can Be Cracked in Just 2 Minutes, Experts Warn
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft

April 17, 2026

CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks

April 17, 2026

Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links

April 17, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Unlock the Power of Free WormGPT: Harnessing DeepSeek, Gemini, and Kimi-K2 AI Models

November 27, 202521 Views

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.