{"id":11947,"date":"2026-02-19T05:17:34","date_gmt":"2026-02-19T05:17:34","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=11947"},"modified":"2026-02-19T05:17:34","modified_gmt":"2026-02-19T05:17:34","slug":"new-keenadu-android-malware-discovered-on-hundreds-of-gadgets","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=11947","title":{"rendered":"New Keenadu Android Malware Discovered on Hundreds of Gadgets"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>Researchers at Kaspersky have analyzed a not too long ago found Android malware that allows its operators to remotely management compromised units.<\/strong><\/p>\n<p>Dubbed <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/securelist.com\/keenadu-android-backdoor\/118913\/\"><strong>Keenadu<\/strong><\/a>, the backdoor has been discovered within the firmware of varied Android gadget manufacturers, notably tablets.\u00a0<\/p>\n<p>Whereas in some instances the malware seems to have been injected into the firmware throughout improvement, it has additionally been delivered to units by way of OTA firmware updates.\u00a0<\/p>\n<p>The malware offers its operators full management of the contaminated gadget, but it surely appears to be primarily used for advert fraud. Kaspersky researchers have seen Keenadu payloads designed to hijack browser search engines like google and yahoo, monetize new app installs, and click on on adverts.<\/p>\n<p>In lots of instances the malware was preinstalled on units, however the safety agency has additionally seen it being distributed by way of numerous software shops (together with Google Play and Xiaomi GetApps) disguised as sensible digital camera apps. The faux functions recognized by Kaspersky on Google Play had been downloaded greater than 300,000 occasions earlier than they had been eliminated.\u00a0<\/p>\n<p>The safety agency\u2019s merchandise have detected Keenadu malware infections on roughly 13,000 units, primarily in Russia, Japan, Germany, Brazil, and the Netherlands.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p>\u201cA duplicate of the backdoor is loaded into the handle area of each app upon launch,\u201d Kaspersky defined, including, \u201cIn sure firmware builds, Keenadu was built-in straight into crucial system utilities, together with the facial recognition service, the launcher app, and others.\u201d<\/p>\n<p>The researchers have discovered hyperlinks between Keenadu and a number of other large botnets largely powered by low-cost Android units, together with <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/triada-trojan-pre-installed-low-cost-android-smartphones\/\">Triada<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/vo1d-botnet-evolves-as-it-ensnares-1-6-million-android-tv-boxes\/\">Vo1d<\/a>, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/badbox-botnet-powered-by-1-million-android-devices-disrupted\/\">BadBox<\/a>.\u00a0<\/p>\n<p>As with the opposite botnets, proof signifies that Keenadu has Chinese language origins.\u00a0<\/p>\n<p>\u201cA number of of the most important Android botnets are interacting with each other,\u201d Kaspersky mentioned. \u201cPresently, we now have confirmed hyperlinks between Triada, Vo1d, and BadBox, in addition to the connection between Keenadu and BadBox.\u201d\u00a0<\/p>\n<p>\u201cIt is very important emphasize that these connections will not be essentially transitive,\u201d the corporate added. \u201cFor instance, the truth that each Triada and Keenadu are linked to BadBox doesn&#8217;t routinely indicate that Triada and Keenadu are straight related; such a declare would require separate proof. Nonetheless, given the present panorama, we&#8217;d not be shocked if future stories present the proof wanted to show the transitivity of those relationships.\u201d<\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/new-sshstalker-linux-botnet-uses-old-techniques\/\">New \u2018SSHStalker\u2019 Linux Botnet Makes use of Outdated Strategies<\/a><\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/gobruteforcer-botnet-targeting-crypto-blockchain-projects\/\">GoBruteforcer Botnet Concentrating on Crypto, Blockchain Initiatives<\/a><\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/kimwolf-android-botnet-ensnares-1-8-million-devices\/\">\u2018Kimwolf\u2019 Android Botnet Ensnares 1.8 Million Gadgets<\/a>\n\t\t\t<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Researchers at Kaspersky have analyzed a not too long ago found Android malware that allows its operators to remotely management compromised units. Dubbed Keenadu, the backdoor has been discovered within the firmware of varied Android gadget manufacturers, notably tablets.\u00a0 Whereas in some instances the malware seems to have been injected into the firmware throughout improvement, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11949,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[797,355,7902,216,2251],"class_list":["post-11947","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-android","tag-devices","tag-keenadu","tag-malware","tag-thousands"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11947"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11947\/revisions"}],"predecessor-version":[{"id":11948,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11947\/revisions\/11948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/11949"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-09 01:05:51 UTC -->